Sciweavers

5488 search results - page 25 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
104
Voted
CCS
1993
ACM
15 years 7 months ago
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
Mihir Bellare, Phillip Rogaway
111
Voted
FOSAD
2000
Springer
15 years 7 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
98
Voted
ACISP
2010
Springer
15 years 5 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
98
Voted
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
15 years 3 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...
117
Voted
IPPS
2006
IEEE
15 years 9 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti