Sciweavers

460 search results - page 12 / 92
» Heuristic Methods for Security Protocols
Sort
View
CORR
2007
Springer
72views Education» more  CORR 2007»
13 years 7 months ago
A Heuristic Routing Mechanism Using a New Addressing Scheme
Current methods of routing are based on network information in the form of routing tables, in which routing protocols determine how to update the tables according to the network ch...
Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud...
ASM
2008
ASM
13 years 9 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
CSFW
2002
IEEE
14 years 18 days ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
IEEEARES
2006
IEEE
14 years 1 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
JLP
2008
75views more  JLP 2008»
13 years 7 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...