Sciweavers

5488 search results - page 25 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
FOSAD
2000
Springer
14 years 10 days ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
ACISP
2010
Springer
13 years 10 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
13 years 8 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...
IPPS
2006
IEEE
14 years 2 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti