Sciweavers

297 search results - page 33 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
ASIACRYPT
2004
Springer
14 years 1 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
PERCOM
2007
ACM
14 years 7 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
SOCO
2005
Springer
14 years 1 months ago
A Model of Components with Non-regular Protocols
Abstract. Behavioral specifications that are integrated into component interfaces are an important means for the correct construction of component-based systems. Currently, such s...
Mario Südholt
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
WOTUG
2007
13 years 8 months ago
Modeling and Analysis of the AMBA Bus Using CSP and B
Abstract. In this paper, we present a formal model and analysis of the AMBA Advanced High-performance Bus (AHB) on-chip bus. The model is given in CSP B—an integration of the pro...
Alistair A. McEwan, Steve Schneider