Sciweavers

1490 search results - page 67 / 298
» The Logic of Authentication Protocols
Sort
View
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 7 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
IDC
2009
Springer
14 years 3 months ago
A Protocol for Execution of Distributed Logic Programs
In the last fifteen years many work in logic programming has focussed on parallel implementations both in shared memory and in distributed memory multiprocessor systems. In both c...
László Aszalós, Andreas Herzi...
ACOM
2006
Springer
14 years 2 months ago
Temporal Logics for Representing Agent Communication Protocols
Abstract. This paper explores the use of temporal logics in the context of communication protocols for multiagent systems. We concentrate on frameworks where protocols are used to ...
Ulle Endriss
SPW
2005
Springer
14 years 2 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano