Sciweavers

860 search results - page 12 / 172
» Uncovering Attacks on Security Protocols
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 4 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
ISCC
2002
IEEE
15 years 2 months ago
An active security protocol against DoS attacks
Domenico Cotroneo, L. Peluso, Simon Pietro Romano,...
JISE
2006
37views more  JISE 2006»
14 years 9 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
ISECS
2008
IEEE
15 years 4 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel