Sciweavers

4111 search results - page 175 / 823
» Security, Protocols, and Trust
Sort
View
AGENTS
2000
Springer
14 years 2 months ago
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
This paper extends earlier work in the use of ‘Agent-based Computational Economics’ (ACE) for modelling the development of co-operation between firms. Inter-firm relations hav...
Bart Nooteboom, Tomas Klos, René J. Jorna
CCS
2008
ACM
14 years 5 days ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
ICITA
2005
IEEE
14 years 4 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
FSEN
2007
Springer
14 years 4 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek