Sciweavers

168 search results - page 2 / 34
» A Model of Computation for the NRL Protocol Analyzer
Sort
View
ICALP
2005
Springer
14 years 26 days ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
ESORICS
2010
Springer
13 years 8 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
PERCOM
2004
ACM
14 years 7 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
AINA
2007
IEEE
14 years 1 months ago
Building Web-Base SIP Analyzer with Ajax Approach
Web applications are generally less interactive than desktop applications. Due to the simple request-response model between web browsers and web servers, users usually experience ...
Quincy Wu, Yan-Hsiang Wang
CONCUR
2008
Springer
13 years 9 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...