Sciweavers

1490 search results - page 104 / 298
» The Logic of Authentication Protocols
Sort
View
IJISEC
2008
92views more  IJISEC 2008»
13 years 9 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
ENTCS
2006
142views more  ENTCS 2006»
13 years 9 months ago
Specialization of Interaction Protocols in a Temporal Action Logic
Temporal logics are well suited for the specification and verification of systems of communicating agents. In this paper we adopt a social approach to agent communication, where c...
Laura Giordano, Alberto Martelli, Camilla Schwind
CSFW
2006
IEEE
14 years 3 months ago
Computationally Sound Compositional Logic for Key Exchange Protocols
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
ICNP
1999
IEEE
14 years 1 months ago
A Logical Ring Reliable Multicast Protocol for Mobile Nodes
A protocol for the reliable multicast of data to mobile hosts is described. A logical ring is maintained between all the base stations that handle the multicast traffic of the sam...
Ioanis Nikolaidis, Janelle J. Harms
SAC
2004
ACM
14 years 2 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert