Sciweavers

461 search results - page 29 / 93
» Developing security protocols by refinement
Sort
View
COLCOM
2007
IEEE
14 years 2 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
ASIACRYPT
2001
Springer
14 years 9 days ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
CSFW
2000
IEEE
13 years 11 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider
IPL
2006
85views more  IPL 2006»
13 years 7 months ago
A flaw in the electronic commerce protocol SET
The Secure Electronic Transaction (SET) protocol has been developed by the major credit card companies in association with some of the top software corporations to secure e-commer...
Srecko Brlek, Sardaouna Hamadou, John Mullins
CSFW
2005
IEEE
14 years 1 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...