Sciweavers

3821 search results - page 204 / 765
» A Security Model for Aglets
Sort
View
EUROCRYPT
1999
Springer
14 years 1 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
EUROCRYPT
2000
Springer
14 years 27 days ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
JCP
2008
142views more  JCP 2008»
13 years 9 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
ESORICS
2002
Springer
14 years 8 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 3 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...