Sciweavers

144 search results - page 21 / 29
» The faithfulness of abstract protocol analysis: message auth...
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 7 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
TACAS
2007
Springer
144views Algorithms» more  TACAS 2007»
14 years 1 months ago
Detecting Races in Ensembles of Message Sequence Charts
Abstract. The analysis of message sequence charts (MSCs) is highly important in preventing common problems in communication protocols. Detecting race conditions, i.e., possible dis...
Edith Elkind, Blaise Genest, Doron Peled
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 9 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
PODC
2010
ACM
13 years 11 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
IH
1999
Springer
13 years 12 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson