Sciweavers

4111 search results - page 263 / 823
» Security, Protocols, and Trust
Sort
View
50
Voted
CORR
2009
Springer
71views Education» more  CORR 2009»
14 years 10 months ago
Heuristic Methods for Security Protocols
Qurat ul Ain Nizamani, Emilio Tuosto
83
Voted
CORR
2010
Springer
64views Education» more  CORR 2010»
14 years 7 months ago
A Spatial-Epistemic Logic for Reasoning about Security Protocols
Bernardo Toninho, Luís Caires
126
Voted
TDSC
2011
14 years 7 months ago
Securing Topology Maintenance Protocols for Sensor Networks
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,...
104
Voted
ECCC
2011
223views ECommerce» more  ECCC 2011»
14 years 7 months ago
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov, Yehuda Lindell