Sciweavers

287 search results - page 12 / 58
» Mixed Strand Spaces
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
TGC
2005
Springer
14 years 2 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 8 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
IFIP
2009
Springer
13 years 6 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
ISMAR
2008
IEEE
14 years 3 months ago
The design of a mixed-reality book: Is it still a real book?
In this paper we present the results of our long term development of a mixed reality book. Most previous work in the area has focused on the technology of augmented reality books,...
Raphael Grasset, Andreas Dünser, Mark Billing...