Sciweavers

361 search results - page 19 / 73
» Composition of Password-Based Protocols
Sort
View
CSFW
1999
IEEE
14 years 29 days ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
ISARCS
2010
188views Hardware» more  ISARCS 2010»
14 years 19 days ago
Component Behavior Synthesis for Critical Systems,
Abstract. Component-based architectures are widely used in embedded systems. For managing complexity and improving quality separation of concerns is one of the most important princ...
Tobias Eckardt, Stefan Henkler
JCS
2007
120views more  JCS 2007»
13 years 8 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 3 months ago
Application Composition in the SIP Servlet Environment
—The SIP servlet standard is a popular Java application programming interface (API) for developing and deploying Session Initiation Protocol (SIP) applications in Voice over IP (...
Eric Cheung, K. Hal Purdy
ICALP
2010
Springer
14 years 1 months ago
Compositional Closure for Bayes Risk in Probabilistic Noninterference
We give a quantitative sequential model for noninterference security with probability (but not demonic choice), and a novel refinement order that we prove to be the greatest compo...
Annabelle McIver, Larissa Meinicke, Carroll Morgan