Sciweavers

4111 search results - page 150 / 823
» Security, Protocols, and Trust
Sort
View
SP
2000
IEEE
14 years 1 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
PERCOM
2005
ACM
14 years 10 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
CSFW
1999
IEEE
14 years 2 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
TIFS
2010
109views more  TIFS 2010»
13 years 5 months ago
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
Buyer
Alfredo Rial, Mina Deng, Tiziano Bianchi, Alessand...
ACSAC
1999
IEEE
14 years 2 months ago
Towards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has neve...
Jared Karro, Jie Wang