Sciweavers

4111 search results - page 87 / 823
» Security, Protocols, and Trust
Sort
View
FLAIRS
2000
13 years 11 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
KER
2006
70views more  KER 2006»
13 years 10 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
ACISP
2009
Springer
14 years 4 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
CSFW
2008
IEEE
14 years 4 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin