Sciweavers

461 search results - page 23 / 93
» Developing security protocols by refinement
Sort
View
JCS
2011
156views more  JCS 2011»
13 years 2 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
WWW
2010
ACM
13 years 8 months ago
Protocol-aware matching of web service interfaces for adapter development
With the rapid growth in the number of online Web services, the problem of service adaptation has received significant attention. In matching and adaptation, the functional descri...
Hamid R. Motahari Nezhad, Guang Yuan Xu, Boualem B...
CCS
1998
ACM
14 years 10 hour ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
CSFW
2005
IEEE
14 years 1 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...
LREC
2010
132views Education» more  LREC 2010»
13 years 9 months ago
Resources for Controlled Languages for Alert Messages and Protocols in the European Perspective
This paper is concerned with resources for controlled languages for alert messages and protocols in the European perspective. These resources have been produced as the outcome of ...
Sylviane Cardey, Krzysztof Bogacki, Xavier Blanco,...