Sciweavers

1653 search results - page 110 / 331
» Timed analysis of security protocols
Sort
View
109
Voted
IFIP
2009
Springer
15 years 9 days ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov
115
Voted
ESORICS
2009
Springer
15 years 9 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
117
Voted
IACR
2011
135views more  IACR 2011»
14 years 2 months ago
An Improved Internet Voting Protocol
Norway is going to experience an Internet voting scheme in September 2011 for local governmental elections, targeting a comprehensive Internet voting system in 2017 for national el...
Mehmet Sabir Kiraz, Süleyman Kardas, Muhammed...
167
Voted
WISTP
2010
Springer
15 years 9 months ago
MoteAODV - An AODV Implementation for TinyOS 2.0
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
Werner Backes, Jared Cordasco
111
Voted
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 6 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider