Sciweavers

3751 search results - page 36 / 751
» Events in security protocols
Sort
View
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 9 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
CCS
2003
ACM
14 years 28 days ago
Fast automatic synthesis of security protocols using backward search
Ò ÙØÓÑ Ø × ÙÖ ØÝ ÔÖÓØÓ ÓÐ Ò Ö ØÓÖ × ÔÖÓÔÓ× Ø Ø Ù× × ÐÓ ¹ × ×ÝÒØ × × ÖÙÐ × ØÓ Ù Ø Ò Û Ö × Ö ÓÖ ×Ù Ø Ð ÔÖÓØÓ Ó...
Hongbin Zhou, Simon N. Foley
SPW
2001
Springer
14 years 4 days ago
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
William Aiello, Steven M. Bellovin, Matt Blaze, Ra...
CSFW
2000
IEEE
14 years 3 days ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...