Sciweavers

1059 search results - page 81 / 212
» Modeling Security Protocols as Games
Sort
View
ASIACRYPT
2006
Springer
14 years 1 months ago
HIBE With Short Public Parameters Without Random Oracle
Abstract. At Eurocrypt 2005, Waters presented an identity based encryption (IBE) protocol which is secure in the full model without random oracle. In this paper, we extend Waters&#...
Sanjit Chatterjee, Palash Sarkar
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
14 years 3 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 1 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
AMAST
2000
Springer
14 years 2 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri
ARGMAS
2005
Springer
14 years 3 months ago
A Protocol for Arguing About Rejections in Negotiation
One form of argument-based negotiation is when agents argue about why an offer was rejected. If an agent can state a reason for a rejection of an offer, the negotiation process m...
Jelle van Veenen, Henry Prakken