Sciweavers

1190 search results - page 62 / 238
» Secure off-the-record messaging
Sort
View
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 8 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
ISPEC
2010
Springer
15 years 6 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ESORICS
2002
Springer
16 years 4 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe
PET
2004
Springer
15 years 10 months ago
Synchronous Batching: From Cascades to Free Routes
The variety of possible anonymity network topologies has spurred much debate in recent years. In a synchronous batching design, each batch of messages enters the mix network togeth...
Roger Dingledine, Vitaly Shmatikov, Paul F. Syvers...
140
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn