Sciweavers

1653 search results - page 37 / 331
» Timed analysis of security protocols
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The main reason for constructing sealed-bid auction prot...
Mehrdad Nojoumian, Douglas R. Stinson
DAGSTUHL
2003
13 years 9 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
IJNSEC
2007
123views more  IJNSEC 2007»
13 years 7 months ago
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
Theodore Stergiou, Dimitrios L. Delivasilis
RTCSA
1999
IEEE
13 years 12 months ago
Non-Blocking Data Sharing in Multiprocessor Real-Time Systems
A non-blocking protocol that allows real-time tasks to share data in a multiprocessor system is presented in this paper. The protocol gives the means to concurrent real-time tasks...
Philippas Tsigas, Yi Zhang