Sciweavers

526 search results - page 11 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
EPEW
2005
Springer
14 years 1 months ago
Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step
Abstract. Global choreographies define the rules that peers should respect in their interaction, with the aim of guaranteeing interoperability. act choreography can be seen as a p...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first...
Tal Moran, Moni Naor
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 7 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
IANDC
2008
120views more  IANDC 2008»
13 years 7 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
CSFW
2004
IEEE
13 years 11 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su