Sciweavers

4111 search results - page 87 / 823
» Security, Protocols, and Trust
Sort
View
119
Voted
FLAIRS
2000
15 years 2 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
86
Voted
KER
2006
70views more  KER 2006»
15 years 19 days ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
70
Voted
ACISP
2009
Springer
15 years 7 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
CSFW
2008
IEEE
15 years 7 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin
74
Voted
CSFW
2007
IEEE
15 years 7 months ago
Electing the Doge of Venice: Analysis of a 13th Century Protocol
Miranda Mowbray, Dieter Gollmann