Sciweavers

3115 search results - page 47 / 623
» Synthesizing Secure Protocols
Sort
View
ICISC
2007
95views Cryptology» more  ICISC 2007»
13 years 10 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 18 days ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
14 years 11 days ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
CONEXT
2006
ACM
14 years 3 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
POPL
2010
ACM
14 years 6 months ago
Modular Verification of Security Protocol Code by Typing
Andrew D. Gordon, Cédric Fournet, Karthikey...