Sciweavers

3115 search results - page 51 / 623
» Synthesizing Secure Protocols
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data ful...
Rafael Accorsi
ACSW
2003
13 years 10 months ago
A Secure Mental Poker Protocol Over The Internet
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encryption and decryption of individual cards. The protocol satisfies all major sec...
Weiliang Zhao, Vijay Varadharajan, Yi Mu
CCS
2001
ACM
14 years 1 months ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
RFIDSEC
2010
13 years 7 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
CSFW
2000
IEEE
14 years 1 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider