Sciweavers

224 search results - page 10 / 45
» Transformations between Cryptographic Protocols
Sort
View
CSL
2010
Springer
13 years 11 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
14 years 4 months ago
Conceiving Interoperability between Public Authorities - A Methodical Framework
An increasing level of cooperation between public administrations nowadays on national, regional and local level requires methods to develop interoperable EGovernment systems and ...
Jörg Ziemann, Thomas Matheis, Dirk Werth
ICALP
2005
Springer
14 years 3 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
IANDC
2008
105views more  IANDC 2008»
13 years 10 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...