Sciweavers

5488 search results - page 184 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Protocols for data-hiding based text document security and automatic processing
Text documents, in electronic and hardcopy forms, are and will probably remain the most widely used kind of content in our digital age. The goal of this paper is to overview proto...
Frédéric Deguillaume, Yuriy Rytsar, ...
IFIP
2010
Springer
14 years 11 months ago
A Calculus for the Analysis of Wireless Network Security Protocols
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled ...
Francesco Ballardin, Massimo Merro
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
PERCOM
2003
ACM
16 years 4 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
CIA
2001
Springer
15 years 9 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt