Sciweavers

3821 search results - page 177 / 765
» A Security Model for Aglets
Sort
View
STACS
2007
Springer
14 years 3 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 3 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
ASIACRYPT
2005
Springer
14 years 2 months ago
Modular Security Proofs for Key Agreement Protocols
The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular approach to the construction of proofs of security ...
Caroline Kudla, Kenneth G. Paterson
IADIS
2003
13 years 10 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
EUSFLAT
2009
152views Fuzzy Logic» more  EUSFLAT 2009»
13 years 7 months ago
Fuzzy and PSO Based Algorithm for Driver's Behavior Modeling
The study of human behavior during driving is of primary importance for the improvement of drivers' security. This study is complex because of numerous situations in which the...
Sohrab Khanmohammadi, Mohammad Ali Tinati, Sehrane...