Sciweavers

1612 search results - page 7 / 323
» About models of security protocols
Sort
View
ICALP
2007
Springer
13 years 9 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
ACSAC
1999
IEEE
13 years 11 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
IWSEC
2007
Springer
14 years 1 months ago
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Jörg Schwenk
CSFW
2008
IEEE
14 years 1 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin