Sciweavers

3504 search results - page 52 / 701
» Secure protocol composition
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 1 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
ASIACRYPT
2001
Springer
15 years 1 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
14 years 11 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
CCS
2003
ACM
15 years 3 months ago
Fast automatic synthesis of security protocols using backward search
Ò ÙØÓÑ Ø × ÙÖ ØÝ ÔÖÓØÓ ÓÐ Ò Ö ØÓÖ × ÔÖÓÔÓ× Ø Ø Ù× × ÐÓ ¹ × ×ÝÒØ × × ÖÙÐ × ØÓ Ù Ø Ò Û Ö × Ö ÓÖ ×Ù Ø Ð ÔÖÓØÓ Ó...
Hongbin Zhou, Simon N. Foley
SPW
2001
Springer
15 years 2 months ago
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
William Aiello, Steven M. Bellovin, Matt Blaze, Ra...