Sciweavers

3504 search results - page 498 / 701
» Secure protocol composition
Sort
View
ICLP
2009
Springer
15 years 8 months ago
An Overview of FORCES: An INRIA Project on Declarative Formalisms for Emergent Systems
Abstract. The FORCES project aims at providing robust and declarative formalisms for analyzing systems in the emerging areas of Security Protocols, Biological Systems and Multimedi...
Jesús Aranda, Gérard Assayag, Carlos...
100
Voted
TGC
2007
Springer
15 years 7 months ago
Computational Soundness of Equational Theories (Tutorial)
Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Steve Kremer
LCN
2000
IEEE
15 years 6 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
FAC
2008
67views more  FAC 2008»
15 years 1 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
IJNSEC
2006
110views more  IJNSEC 2006»
15 years 1 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo