Sciweavers

4111 search results - page 248 / 823
» Security, Protocols, and Trust
Sort
View
CSL
2010
Springer
15 years 1 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
91
Voted
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 6 months ago
Trusted Software's Holy Grail
In this paper, we discuss what we believe is the grand challenge facing the software quality research community: the ability to accurately define, in the very earliest stages of d...
Jeffrey M. Voas
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 4 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
PACT
2005
Springer
15 years 6 months ago
On Evaluating the Performance of Security Protocols
Abstract. We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign...
Chiara Bodei, Mikael Buchholtz, Michele Curti, Pie...
104
Voted
WMASH
2004
ACM
15 years 6 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...