Sciweavers

5488 search results - page 153 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
152
Voted
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
16 years 4 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
134
Voted
JSS
2007
79views more  JSS 2007»
15 years 4 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo
CAV
2008
Springer
144views Hardware» more  CAV 2008»
15 years 6 months ago
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
A Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper) Michael Backes1,2 , Stefan Lorenz1 , Matteo Maffei1 , and Kim Pecina1 1 Saarland University, Saarbr
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
FUIN
2008
103views more  FUIN 2008»
15 years 4 months ago
LDYIS: a Framework for Model Checking Security Protocols
We present a formalism for the automatic verification of security protocols based on multi-agent systems semantics. We give the syntax and semantics of a temporal-epistemic securit...
Alessio Lomuscio, Wojciech Penczek
ACSD
2010
IEEE
261views Hardware» more  ACSD 2010»
15 years 2 months ago
Partial Order Reduction for Branching Security Protocols
We extend the partial order reduction algorithm of Clarke et al. [CJM00] to handle branching security protocols, such as optimistic fair exchange protocols. Applications of the pro...
Wan Fokkink, Mohammad Torabi Dashti, Anton Wijs