Sciweavers

4111 search results - page 105 / 823
» Security, Protocols, and Trust
Sort
View
87
Voted
CSE
2009
IEEE
15 years 7 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
JUCS
2010
89views more  JUCS 2010»
14 years 11 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
79
Voted
FOSAD
2007
Springer
15 years 7 months ago
Security Protocols: Principles and Calculi
Martín Abadi
71
Voted
SPW
2004
Springer
15 years 6 months ago
Toward a Broader View of Security Protocols
Matt Blaze
ASIACRYPT
2001
Springer
15 years 5 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern