Sciweavers

3115 search results - page 53 / 623
» Synthesizing Secure Protocols
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 1 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass