Sciweavers

576 search results - page 77 / 116
» Modeling Adversaries in a Logic for Security Protocol Analys...
Sort
View
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 17 days ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
ESAS
2007
Springer
14 years 3 months ago
Security Associations in Personal Networks: A Comparative Analysis
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Jani Suomalainen, Jukka Valkonen, N. Asokan
JUCS
2008
166views more  JUCS 2008»
13 years 8 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
CCS
2008
ACM
13 years 11 months ago
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the plain model with a non-interactive protocol in groups ...
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
ESORICS
2002
Springer
14 years 8 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz