Sciweavers

2812 search results - page 4 / 563
» Secrecy in Multiagent Systems
Sort
View
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
13 years 11 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 7 months ago
The Gaussian Multiple Access Wire-Tap Channel
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intellige...
Ender Tekin, Aylin Yener
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 7 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
POPL
1998
ACM
13 years 11 months ago
The SLam Calculus: Programming with Secrecy and Integrity
The SLam calculus is a typed -calculus that maintains security information as well as type information. The type system propagates security information for each object in four for...
Nevin Heintze, Jon G. Riecke
ICALP
2003
Springer
14 years 17 days ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...