Sciweavers

2162 search results - page 81 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CORR
2007
Springer
73views Education» more  CORR 2007»
13 years 8 months ago
A Case For Amplify-Forward Relaying in the Block-Fading Multi-Access Channel
This paper demonstrates the significant gains that multi-access users can achieve from sharing a single amplify-forward relay in slow fading environments. The proposed protocol, ...
Deqiang Chen, Kambiz Azarian, J. Nicholas Laneman
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 8 months ago
Accountable Anonymous Group Messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
14 years 3 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
ASWEC
2006
IEEE
14 years 2 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
IFIP
2004
Springer
14 years 2 months ago
Complementing Computational Protocol Analysis with Formal Specifications
Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversa...
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...