Sciweavers

3115 search results - page 10 / 623
» Synthesizing Secure Protocols
Sort
View
FOSAD
2000
Springer
13 years 11 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
ACISP
2010
Springer
13 years 9 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
13 years 7 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 7 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
GCC
2003
Springer
14 years 28 days ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...