Sciweavers

253 search results - page 22 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 1 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
ISARCS
2010
188views Hardware» more  ISARCS 2010»
13 years 11 months ago
Component Behavior Synthesis for Critical Systems,
Abstract. Component-based architectures are widely used in embedded systems. For managing complexity and improving quality separation of concerns is one of the most important princ...
Tobias Eckardt, Stefan Henkler
NETWORKING
2004
13 years 9 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
IACR
2011
192views more  IACR 2011»
12 years 7 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
ICWS
2004
IEEE
13 years 9 months ago
Realizability of Conversation Protocols With Message Contents
A conversation protocol is a top-down specification framework which specifies desired global behaviors of a web service composition. In our earlier work [6] we studied the problem...
Xiang Fu, Tevfik Bultan, Jianwen Su