Sciweavers

3115 search results - page 54 / 623
» Synthesizing Secure Protocols
Sort
View
WWW
2002
ACM
14 years 9 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
EUROCRYPT
2000
Springer
14 years 20 days ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
COMCOM
2000
143views more  COMCOM 2000»
13 years 9 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
14 years 3 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd