Sciweavers

1653 search results - page 37 / 331
» Timed analysis of security protocols
Sort
View
ICICS
2010
Springer
14 years 7 months ago
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The main reason for constructing sealed-bid auction prot...
Mehrdad Nojoumian, Douglas R. Stinson
DAGSTUHL
2003
14 years 11 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
IJNSEC
2007
123views more  IJNSEC 2007»
14 years 9 months ago
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
Theodore Stergiou, Dimitrios L. Delivasilis
RTCSA
1999
IEEE
15 years 2 months ago
Non-Blocking Data Sharing in Multiprocessor Real-Time Systems
A non-blocking protocol that allows real-time tasks to share data in a multiprocessor system is presented in this paper. The protocol gives the means to concurrent real-time tasks...
Philippas Tsigas, Yi Zhang