Sciweavers

1059 search results - page 122 / 212
» Modeling Security Protocols as Games
Sort
View
122
Voted
ACISP
2010
Springer
15 years 5 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
144
Voted
ASIACRYPT
2001
Springer
15 years 7 months ago
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
Dynamic group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to work in a scenario in which the group membership is not known in advance but where parti...
Emmanuel Bresson, Olivier Chevassut, David Pointch...
134
Voted
IJISEC
2006
108views more  IJISEC 2006»
15 years 3 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
132
Voted
FAC
2008
67views more  FAC 2008»
15 years 3 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
195
Voted
DSN
2011
IEEE
14 years 3 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...