Sciweavers

2162 search results - page 30 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CSFW
1998
IEEE
14 years 28 days ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CIA
1998
Springer
14 years 27 days ago
Cooperative vs. Competitive Multi-Agent Negotiations in Retail Electronic Commerce
A key lesson learned from economic and game theory research is that negotiation protocols have substantial, rippling effects on the overall nature of the system. online auctions a...
Robert H. Guttman, Pattie Maes
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 10 days ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
ISW
2000
Springer
14 years 7 days ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
ISICT
2003
13 years 10 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan