Sciweavers

3088 search results - page 100 / 618
» Multichannel Security Protocols
Sort
View
CADE
2008
Springer
14 years 9 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
ISW
2010
Springer
13 years 6 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin
TKDE
2002
112views more  TKDE 2002»
13 years 8 months ago
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
Database systems for real-time applications must satisfy timing constraints associated with transactions. Typically, a timing constraint is expressed in the form of a deadline and ...
Chanjung Park, Seog Park, Sang Hyuk Son
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 3 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
TPHOL
2009
IEEE
14 years 3 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...