Sciweavers

860 search results - page 12 / 172
» Uncovering Attacks on Security Protocols
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 10 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 1 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
ISCC
2002
IEEE
13 years 11 months ago
An active security protocol against DoS attacks
Domenico Cotroneo, L. Peluso, Simon Pietro Romano,...
JISE
2006
37views more  JISE 2006»
13 years 6 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
ISECS
2008
IEEE
14 years 1 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel