Sciweavers

3811 search results - page 29 / 763
» The Safe-Tcl Security Model
Sort
View
CSFW
1999
IEEE
15 years 6 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
SAC
2002
ACM
15 years 1 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
15 years 8 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
ESORICS
2005
Springer
15 years 7 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ISI
2005
Springer
15 years 7 months ago
Testing a Rational Choice Model of Airline Hijackings
Laura Dugan, Gary LaFree, Alex R. Piquero