Sciweavers

4111 search results - page 245 / 823
» Security, Protocols, and Trust
Sort
View
96
Voted
LICS
2006
IEEE
15 years 6 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
96
Voted
MOBIHOC
2006
ACM
16 years 10 days ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
92
Voted
ICFEM
2009
Springer
14 years 10 months ago
Improving Automatic Verification of Security Protocols with XOR
Abstract. K
Xihui Chen, Ton van Deursen, Jun Pang
99
Voted
ACISP
2007
Springer
15 years 4 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...
ENTCS
2000
112views more  ENTCS 2000»
15 years 17 days ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato