Sciweavers

325 search results - page 5 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
CSFW
1999
IEEE
13 years 11 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
IICS
2005
Springer
14 years 29 days ago
Compositional Constraints Generation for Concurrent Real-Time Loops with Interdependent Iterations
Abstract. In this paper we describe an assume/guarantee based execution constraints synthesis algorithm for concurrent threads executing on parallel platforms. Threads are loops wh...
Ismail Assayad, Sergio Yovine
ADBIS
1997
Springer
149views Database» more  ADBIS 1997»
13 years 11 months ago
Concurrency Control Protocol for Nested Transactions in Real-Time Databases
In this paper we consider real-time concurrency control for the nested transaction model. We analyze problems that have pure optimistic and pessimistic approaches. As the solution...
Ekaterina Pavlova, Igor Nekrestyanov
CSFW
1999
IEEE
13 years 11 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali