Sciweavers

3504 search results - page 33 / 701
» Secure protocol composition
Sort
View
ACISP
2005
Springer
15 years 3 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
71
Voted
FSTTCS
2007
Springer
15 years 3 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
AISM
2004
14 years 11 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy
AINA
2004
IEEE
15 years 1 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
88
Voted
GCC
2007
Springer
15 years 3 months ago
A Classification of Service Composition Mismatches to Support Service Mediation
On building a service-oriented architecture for Grid systems, more and more researches have been focused on service composition. Services, however, are not always exactly compatib...
Xitong Li, Yushun Fan, Feng Jiang