Sciweavers

216 search results - page 12 / 44
» Models and Proofs of Protocol Security: A Progress Report
Sort
View
SRDS
2006
IEEE
14 years 22 days ago
Improvements and Reconsideration of Distributed Snapshot Protocols
Distributed snapshots are an important building block for distributed systems, and, among other applications, are useful for constructing efficient checkpointing protocols. In ad...
Adnan Agbaria
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 20 days ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 9 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 6 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
13 years 10 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh