Sciweavers

718 search results - page 12 / 144
» Operational Semantics of Security Protocols
Sort
View
CORR
2004
Springer
166views Education» more  CORR 2004»
13 years 7 months ago
A Process Algebraic Approach to Concurrent and Distributed Quantum Computation: Operational Semantics
Full formal descriptions of algorithms making use of quantum principles must take into account both quantum and classical computing components and assemble them so that they commu...
Marie Lalire, Philippe Jorrand
ACSAC
2009
IEEE
14 years 2 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
CSFW
1997
IEEE
14 years 10 hour ago
Verifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by ...
Steve Schneider
IPL
2010
93views more  IPL 2010»
13 years 6 months ago
Compiling and securing cryptographic protocols
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Yannick Chevalier, Michaël Rusinowitch
SCN
2010
Springer
129views Communications» more  SCN 2010»
13 years 6 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh