Sciweavers

1490 search results - page 87 / 298
» The Logic of Authentication Protocols
Sort
View
211
Voted
POPL
2002
ACM
16 years 4 months ago
Analyzing security protocols with secrecy types and logic programs
Bruno Blanchet, Martín Abadi
127
Voted
ICALP
2005
Springer
15 years 9 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
134
Voted
INDOCRYPT
2004
Springer
15 years 9 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...
115
Voted
IANDC
2008
120views more  IANDC 2008»
15 years 3 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
137
Voted
ASIACRYPT
2003
Springer
15 years 7 months ago
Efficient Group Signatures without Trapdoors
Abstract. Group signature schemes are fundamental cryptographic tools that enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis...
Giuseppe Ateniese, Breno de Medeiros