Sciweavers

5488 search results - page 44 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
143
Voted
CCS
2003
ACM
15 years 8 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
130
Voted
CSFW
2003
IEEE
15 years 8 months ago
A Derivation System for Security Protocols and its Logical Formalization
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
111
Voted
SPW
1999
Springer
15 years 7 months ago
Trust Management and Network Layer Security Protocols
Matt Blaze, John Ioannidis, Angelos D. Keromytis
92
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Rob...
96
Voted
EUROSEC
2010
ACM
15 years 6 months ago
AESSE: a cold-boot resistant implementation of AES
Tilo Müller, Andreas Dewald, Felix C. Freilin...