Sciweavers

4111 search results - page 242 / 823
» Security, Protocols, and Trust
Sort
View
107
Voted
AMAST
2008
Springer
15 years 2 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
142
Voted
CSFW
1999
IEEE
15 years 5 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
15 years 2 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
IFIP11
2004
114views Business» more  IFIP11 2004»
15 years 2 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
89
Voted
JAMIA
2011
68views more  JAMIA 2011»
14 years 3 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...