Sciweavers

3088 search results - page 55 / 618
» Multichannel Security Protocols
Sort
View
CADE
2008
Springer
14 years 9 months ago
Challenges in the Automated Verification of Security Protocols
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
Hubert Comon-Lundh
CJ
2007
85views more  CJ 2007»
13 years 8 months ago
On The Security of a Group Key Agreement Protocol
In this paper we show that the group key agreement protocol proposed by Tseng suffers from a number of serious security vulnerabilities.
Qiang Tang
CSFW
2008
IEEE
13 years 10 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
ESORICS
1994
Springer
14 years 24 days ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
ICC
2000
IEEE
153views Communications» more  ICC 2000»
14 years 1 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves