Sciweavers

3115 search results - page 6 / 623
» Synthesizing Secure Protocols
Sort
View
102
Voted
CSFW
1997
IEEE
15 years 7 months ago
Proving Properties of Security Protocols by Induction
Lawrence C. Paulson
107
Voted
CSFW
1996
IEEE
15 years 7 months ago
A High-Throughput Secure Reliable Multicast Protocol
Dalia Malki, Michael K. Reiter
133
Voted
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 9 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
92
Voted
ACISP
2009
Springer
15 years 10 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson