Sciweavers

718 search results - page 29 / 144
» Security protocols, properties, and their monitoring
Sort
View
CSFW
2005
IEEE
15 years 7 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...
POPL
2000
ACM
15 years 6 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 7 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
EUROCRYPT
2010
Springer
15 years 6 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
ENTCS
2006
173views more  ENTCS 2006»
15 years 1 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin