Sciweavers

1653 search results - page 95 / 331
» Timed analysis of security protocols
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
13 years 10 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
ACISP
2010
Springer
13 years 8 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
INFOCOM
2011
IEEE
13 years 1 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...
ECBS
2009
IEEE
113views Hardware» more  ECBS 2009»
14 years 4 months ago
Modeling and Analysis of Probabilistic Timed Systems
Probabilistic models are useful for analyzing systems which operate under the presence of uncertainty. In this paper, we present a technique for verifying safety and liveness prop...
Abhishek Dubey, Derek Riley, Sherif Abdelwahed, Te...
IEEEIAS
2009
IEEE
13 years 7 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian