Sciweavers

36 search results - page 5 / 8
» Analysis of Typed Analyses of Authentication Protocols
Sort
View
108
Voted
CISIM
2007
IEEE
15 years 9 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
125
Voted
RFIDSEC
2010
15 years 1 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
ESORICS
2005
Springer
15 years 9 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
116
Voted
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 7 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
JAR
2008
115views more  JAR 2008»
15 years 3 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...