Sciweavers

215 search results - page 13 / 43
» Analyzing Security Protocols Using Time-Bounded Task-PIOAs
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
ESOP
2005
Springer
14 years 2 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
CCS
1998
ACM
14 years 28 days ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
ACSAC
1998
IEEE
14 years 29 days ago
Electronic Submission Protocol Based on Temporal Accountability
This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, an...
Michiharu Kudo
GI
2009
Springer
13 years 6 months ago
Towards the impact of the operational environment on the security of e-voting
Abstract: Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was...
Axel Schmidt, Melanie Volkamer, Lucie Langer, Joha...