Sciweavers

224 search results - page 9 / 45
» Transformations between Cryptographic Protocols
Sort
View
LOPSTR
2001
Springer
14 years 2 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
CCS
1994
ACM
14 years 2 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
IWIA
2005
IEEE
14 years 3 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ER
2006
Springer
170views Database» more  ER 2006»
14 years 1 months ago
A Semantic Transformation Approach for ISO 15926
Abstract. Traditional industries anticipate supporting cross-organizational cooperation as applied in the semantic Web and Web services environments. However, the international sta...
Sari Hakkarainen, Lillian Hella, Darijus Strasunsk...
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 3 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu