Sciweavers

1490 search results - page 181 / 298
» The Logic of Authentication Protocols
Sort
View
92
Voted
GC
2004
Springer
15 years 4 months ago
The SOCS Computational Logic Approach to the Specification and Verification of Agent Societies
This article summarises part of the work done during the first two years of the SOCS project, with respect to the task of modelling interaction amongst CL-based agents. It describe...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...
111
Voted
CCS
2011
ACM
14 years 16 days ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
101
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
131
Voted
WMASH
2005
ACM
15 years 6 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
101
Voted
CADE
2004
Springer
16 years 27 days ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl