Sciweavers

275 search results - page 20 / 55
» Analysis of a Fair Exchange Protocol
Sort
View
VOTEID
2007
Springer
14 years 5 months ago
Simulation-Based Analysis of E2E Voting Systems
Abstract. End-to-end auditable voting systems are expected to guarantee very interesting, and often sophisticated security properties, including correctness, privacy, fairness, rec...
Olivier de Marneffe, Olivier Pereira, Jean-Jacques...
ATAL
2005
Springer
14 years 4 months ago
The induction of communication protocols
This paper describes our preliminary analysis on the induction of communication protocols. Our work has two goals: (i) to recognize rules (i.e. protocols) from the communicative b...
Nik Nailah Binti Abdullah
CSREASAM
2006
14 years 11 days ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
CCS
2005
ACM
14 years 4 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
CSFW
2005
IEEE
14 years 4 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...