Sciweavers

186 search results - page 25 / 38
» Formal Modeling and Analysis of the Modbus Protocol
Sort
View
IFIP
2010
Springer
13 years 2 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
FC
2007
Springer
148views Cryptology» more  FC 2007»
14 years 1 months ago
A Model of Onion Routing with Provable Anonymity
Onion routing is a scheme for anonymous communication that is designed for practical use. Until now, however, it has had no formal model and therefore no rigorous analysis of its a...
Joan Feigenbaum, Aaron Johnson, Paul F. Syverson
DISCEX
2003
IEEE
14 years 21 days ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker
ASIACRYPT
2004
Springer
14 years 24 days ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
CCS
2001
ACM
13 years 12 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel