Sciweavers

4111 search results - page 260 / 823
» Security, Protocols, and Trust
Sort
View
CORR
2007
Springer
56views Education» more  CORR 2007»
15 years 23 days ago
Deciding security properties for cryptographic protocols. Application to key cycles
Hubert Comon-Lundh, Véronique Cortier, Euge...
76
Voted
JAR
2006
63views more  JAR 2006»
15 years 23 days ago
Automated Reasoning for Security Protocol Analysis
Alessandro Armando, David A. Basin, Jorge Cu&eacut...
96
Voted
JCS
2006
74views more  JCS 2006»
15 years 22 days ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater
53
Voted
JISE
2006
37views more  JISE 2006»
15 years 22 days ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
83
Voted
TISSEC
2008
80views more  TISSEC 2008»
15 years 20 days ago
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cris...