Sciweavers

1106 search results - page 21 / 222
» Automated Design of Security Protocols
Sort
View
EUROCRYPT
2001
Springer
14 years 2 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
SAC
2002
ACM
13 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 9 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
ICNP
1999
IEEE
14 years 2 months ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König
DAC
1998
ACM
14 years 10 months ago
Automatic Synthesis of Interfaces Between Incompatible Protocols
Roberto Passerone, James A. Rowson, Alberto L. San...