Sciweavers

ACISP
1999
Springer
13 years 12 months ago
Evolution of Fair Non-repudiation with TTP
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transac...
Jianying Zhou, Robert H. Deng, Feng Bao
ACISP
1999
Springer
13 years 12 months ago
On the Symmetric Property of Homogeneous Boolean Functions
We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s cl...
Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
ACISP
1999
Springer
13 years 12 months ago
Changing Thresholds in the Absence of Secure Channels
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there ...
Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-N...
ACISP
1999
Springer
13 years 12 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...
ACISP
1999
Springer
13 years 12 months ago
Companion Viruses and the Macintosh: Threats and Countermeasures
Jeffrey Horton, Jennifer Seberry
ACISP
1999
Springer
13 years 12 months ago
Generalised Cycling Attacks on RSA and Strong RSA Primes
Marc Gysin, Jennifer Seberry
CSFW
1999
IEEE
13 years 12 months ago
Mixed Strand Spaces
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related proble...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CSFW
1999
IEEE
13 years 12 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
CSFW
1999
IEEE
13 years 12 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek