Sciweavers

609 search results - page 101 / 122
» Modelling and Checking Timed Authentication of Security Prot...
Sort
View
ICCCN
2008
IEEE
14 years 3 months ago
A New Proposal for QKD Relaying Models
—We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance betwe...
Cuong Le Quoc, Patrick Bellot
CSFW
2002
IEEE
14 years 2 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
CCS
2006
ACM
14 years 23 days ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
WISEC
2009
ACM
14 years 3 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
ACSAC
2006
IEEE
14 years 24 days ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark