Sciweavers

1490 search results - page 174 / 298
» The Logic of Authentication Protocols
Sort
View
84
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 19 days ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
88
Voted
SIGCOMM
1999
ACM
15 years 4 months ago
A Readable TCP in the Prolac Protocol Language
Prolac is a new statically-typed, object-oriented language for network protocol implementation. It is designed for readability, extensibility, and real-world implementation; most ...
Eddie Kohler, M. Frans Kaashoek, David R. Montgome...
118
Voted
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 4 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
84
Voted
ICCSA
2005
Springer
15 years 6 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
115
Voted
DLOG
2007
15 years 2 months ago
DL-based Alternating-offers Protocol for Automated Multi-issue Bilateral Negotiation
Abstract. We present a novel approach to logic-based bilateral negotiation in ecommerce systems. We use Description Logics to describe both requests/offers submitted by buyers and ...
Azzurra Ragone, Tommaso Di Noia, Eugenio Di Sciasc...