Sciweavers

3751 search results - page 40 / 751
» Events in security protocols
Sort
View
MMMACNS
2010
Springer
13 years 5 months ago
Predictive Security Analysis for Event-Driven Processes
Roland Rieke, Zaharina Stoynova
INDOCRYPT
2004
Springer
14 years 1 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...
LPAR
2004
Springer
14 years 1 months ago
Knowledge-Based Synthesis of Distributed Systems Using Event Structures
Abstract. To produce a program guaranteed to satisfy a given specification one can synthesize it from a formal constructive proof that a computation satisfying that specification...
Mark Bickford, Robert L. Constable, Joseph Y. Halp...
CSFW
2008
IEEE
13 years 9 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...