Sciweavers

1612 search results - page 115 / 323
» About models of security protocols
Sort
View
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 6 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
COMCOM
2000
79views more  COMCOM 2000»
15 years 3 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
FM
2005
Springer
125views Formal Methods» more  FM 2005»
15 years 9 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
JSW
2007
115views more  JSW 2007»
15 years 3 months ago
Modeling Network Behaviour By Full-System Simulation
— Due to the network technology advances, an order-of-magnitude jump has been produced in the network bandwidth. This fact has returned to wake up the interest on protocol offloa...
Andrés Ortiz, Julio Ortega, Antonio F. D&ia...