Sciweavers

2162 search results - page 41 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
IH
1999
Springer
14 years 29 days ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
NOSSDAV
1991
Springer
14 years 6 days ago
The Real-Time Channel Administration Protocol
The Real-time Channel Administration Protocol (RCAP) provides control and administration services for the Tenet real-time protocol suite, a connection-oriented suite of network an...
Anindo Banerjea, Bruce A. Mah
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
14 years 22 hour ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
ACISP
2008
Springer
13 years 10 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
CSFW
2009
IEEE
14 years 3 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...