Sciweavers

3504 search results - page 48 / 701
» Secure protocol composition
Sort
View
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 1 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
ACSAC
2006
IEEE
15 years 1 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini
ACSAC
2004
IEEE
15 years 1 months ago
Towards Secure Design Choices for Implementing Graphical Passwords
We study the impact of selected parameters on the size of the password space for "Draw-A-Secret" (DAS) graphical passwords. We examine the role of and relationships betw...
Julie Thorpe, Paul C. van Oorschot
SOCO
2005
Springer
15 years 3 months ago
A Model of Components with Non-regular Protocols
Abstract. Behavioral specifications that are integrated into component interfaces are an important means for the correct construction of component-based systems. Currently, such s...
Mario Südholt
IEEEIAS
2007
IEEE
15 years 4 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi