Sciweavers

1106 search results - page 22 / 222
» Automated Design of Security Protocols
Sort
View
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
IPPS
2000
IEEE
14 years 1 months ago
Mobile Agents to Automate Fault Management in Wireless and Mobile Networks
This paper studies the automation of fault management of wireless and mobile networks. A network management protocol similar to SNMP with an integrated architecture using mobile ag...
Niki Pissinou, Bhagyavati, Kia Makki
TPHOL
2009
IEEE
14 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...