Sciweavers

3115 search results - page 48 / 623
» Synthesizing Secure Protocols
Sort
View
ESORICS
2003
Springer
14 years 2 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
SYNTHESE
2010
133views more  SYNTHESE 2010»
13 years 3 months ago
Dynamic logics of knowledge and access
A recurring issue in any formal model representing agents' (changing) informational attitudes is how to account for the fact that the agents are limited in their access to the...
Tomohiro Hoshi, Eric Pacuit
IJWMC
2006
112views more  IJWMC 2006»
13 years 9 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
EUROPKI
2007
Springer
14 years 29 days ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...