Sciweavers

2687 search results - page 189 / 538
» Formal Analysis of PKCS
Sort
View
IJISEC
2008
101views more  IJISEC 2008»
15 years 4 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
CORR
2007
Springer
82views Education» more  CORR 2007»
15 years 4 months ago
Mathematical analysis of the recoil growth algorithm to generate multi-polymer systems
The Recoil Growth algorithm, proposed in 1999 by Consta et al., is one of the most efficient algorithm available in the literature to sample from a multi-polymer system. While the ...
F. Simatos
JUCS
2006
124views more  JUCS 2006»
15 years 4 months ago
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
Abstract: We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [Itai and Rodeh 1...
Wan Fokkink, Jun Pang
TCAD
2008
75views more  TCAD 2008»
15 years 4 months ago
Static Analysis of Transaction-Level Communication Models
We propose a methodology for the early estimation of communication implementation choices eftarting from an abstract transaction level system model (TLM). The reference version of ...
Giovanni Agosta, Francesco Bruschi, Donatella Sciu...
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
15 years 4 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...