Sciweavers

5488 search results - page 113 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
EUROPKI
2009
Springer
15 years 2 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
WWW
2007
ACM
16 years 4 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
CCR
2007
115views more  CCR 2007»
15 years 4 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
PERCOM
2007
ACM
16 years 3 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer
POPL
2010
ACM
16 years 1 months ago
Modular Verification of Security Protocol Code by Typing
Andrew D. Gordon, Cédric Fournet, Karthikey...