Sciweavers

3751 search results - page 18 / 751
» Events in security protocols
Sort
View
CCS
2010
ACM
13 years 5 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
FC
2007
Springer
151views Cryptology» more  FC 2007»
14 years 1 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion
JPDC
2011
131views more  JPDC 2011»
13 years 2 months ago
Conditional e-payments with transferability
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are ...
Bogdan Carbunar, Weidong Shi, Radu Sion
COLING
2008
13 years 9 months ago
Online-Monitoring of Security-Related Events
This paper presents a fully operational real-time event extraction system which is capable of accurately and efficiently extracting violent and natural disaster events from vast a...
Martin Atkinson, Jakub Piskorski, Bruno Pouliquen,...
ACISP
2005
Springer
14 years 1 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua