Sciweavers

1777 search results - page 54 / 356
» Programming Cryptographic Protocols
Sort
View
IFIP
2010
Springer
13 years 3 months ago
AnBx - Security Protocols Design and Verification
Michele Bugliesi, Paolo Modesti
IFIP
2010
Springer
13 years 3 months ago
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Abstract. We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational eq...
Naipeng Dong, Hugo L. Jonker, Jun Pang
ACSAC
2000
IEEE
14 years 1 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten
CSFW
1998
IEEE
14 years 29 days ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe