Sciweavers

3504 search results - page 81 / 701
» Secure protocol composition
Sort
View
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
15 years 5 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
CSFW
2006
IEEE
15 years 6 months ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
104
Voted
TACAS
2001
Springer
119views Algorithms» more  TACAS 2001»
15 years 7 months ago
Compositional Message Sequence Charts
Abstract. A message sequence chart (MSC) is a standard notation for describing the interaction between communicating objects. It is popular among the designers of communication pro...
Elsa L. Gunter, Anca Muscholl, Doron Peled
CONEXT
2006
ACM
15 years 8 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
POPL
2010
ACM
15 years 12 months ago
Modular Verification of Security Protocol Code by Typing
Andrew D. Gordon, Cédric Fournet, Karthikey...