Sciweavers

3504 search results - page 88 / 701
» Secure protocol composition
Sort
View
87
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
A Recovery Protocol for Middleware Replicated Databases Providing GSI
José Enrique Armendáriz-Iñigo...
109
Voted
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
15 years 6 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
WWW
2002
ACM
16 years 3 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
143
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
EUROCRYPT
2000
Springer
15 years 6 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel