Sciweavers

5488 search results - page 143 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
TGC
2007
Springer
15 years 10 months ago
Computational Soundness of Equational Theories (Tutorial)
Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Steve Kremer
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 10 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 5 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 10 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
ACISP
1998
Springer
15 years 8 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su