Sciweavers

3504 search results - page 80 / 701
» Secure protocol composition
Sort
View
ICALP
2005
Springer
15 years 8 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
ICISC
2007
95views Cryptology» more  ICISC 2007»
15 years 3 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
121
Voted
IEEESCC
2009
IEEE
15 years 9 months ago
Web Service Substitution Based on Preferences Over Non-functional Attributes
In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...
Ganesh Ram Santhanam, Samik Basu, Vasant Honavar
ICCCN
2008
IEEE
15 years 9 months ago
The RNA Metaprotocol
— The Recursive Network Architecture (RNA) explores the relationship of layering to protocol and network architecture. RNA examines the implications of using a single, tunable pr...
Joseph D. Touch, Venkata K. Pingali
116
Voted
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 6 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel