Sciweavers

576 search results - page 62 / 116
» Modeling Adversaries in a Logic for Security Protocol Analys...
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Robust Bayesian methods for Stackelberg security games
Recent work has applied game-theoretic models to real-world security problems at the Los Angeles International Airport (LAX) and Federal Air Marshals Service (FAMS). The analysis o...
Christopher Kiekintveld, Milind Tambe, Janusz Mare...
JCM
2006
112views more  JCM 2006»
13 years 8 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
JUCS
2007
96views more  JUCS 2007»
13 years 8 months ago
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical identity based encryption (HIBE) protocol. Our main contribution is to present a variant ...
Sanjit Chatterjee, Palash Sarkar
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
ATAL
2004
Springer
14 years 2 months ago
Preferences in Game Logics
We introduce a Game Logic with Preferences (GLP), which makes it possible to reason about how information or assumptions about the preferences of other players can be used by agen...
Sieuwert van Otterloo, Wiebe van der Hoek, Michael...