Sciweavers

1612 search results - page 152 / 323
» About models of security protocols
Sort
View
ICALP
2005
Springer
15 years 10 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 10 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
TPHOL
2000
IEEE
15 years 8 months ago
Routing Information Protocol in HOL/SPIN
We provide a proof using HOL and SPIN of convergence for the Routing Information Protocol (RIP), an internet protocol based on distance vector routing. We also calculate a sharp re...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
CNSM
2010
15 years 1 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...
ATAL
2003
Springer
15 years 9 months ago
Expressive global protocols via logic-based electronic institutions
Communication is the key feature of Multi-agent Systems. The interactions among components of a system may take many distinct forms of increasing complexity such as in auctions, n...
Wamberto Weber Vasconcelos