Sciweavers

1777 search results - page 98 / 356
» Programming Cryptographic Protocols
Sort
View
USENIX
1994
13 years 11 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
IACR
2011
104views more  IACR 2011»
12 years 9 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
IFIP
2009
Springer
14 years 4 months ago
Specifying and Modelling Secure Channels in Strand Spaces
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...
Allaa Kamil, Gavin Lowe
IFIP
2004
Springer
14 years 3 months ago
Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols
Ricardo Staciarini Puttini, Ludovic Mé, Raf...
FSTTCS
2007
Springer
14 years 4 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...