Search

Your search keyword '"COMPUTER network protocols"' showing total 40 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Database Academic Search Index Remove constraint Database: Academic Search Index Publisher ios press Remove constraint Publisher: ios press
40 results on '"COMPUTER network protocols"'

Search Results

1. StatVerif: Verification of stateful processes.

2. On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.

3. Establishing and preserving protocol security goals.

4. Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.

5. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

6. Analysing TLS in the strand spaces model.

7. Finite models for formal security proofs.

8. Inductive trace properties for computational security.

9. Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.

10. Detecting and preventing type flaws at static time.

11. One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings.

12. Adaptively Secure Threshold Signature Scheme in the Standard Model.

13. What Agents Can Probably Enforce.

14. Simulation of Security Protocols based on Scenarios of Attacks.

15. Secrecy for bounded security protocols with freshness check is NEXPTIME-complete.

16. Timed analysis of security protocols.

17. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.

18. Analysis of probabilistic contract signing.

19. On the impossibility of building secure Cliques-type authenticated group key agreement protocols.

20. A Secure Strong-Password Authentication Protocol.

21. Secure set intersection cardinality with application to association rule mining.

22. A derivation system and compositional logic for security protocols.

23. Non‐interference proof techniques for the analysis of cryptographic protocols.

24. Relating multiset rewriting and process algebras for security protocol analysis.

25. Decidability of context‐explicit security protocols.

26. The faithfulness of abstract protocol analysis: Message authentication.

27. SIMULATION BASED VALIDATION OF AUTHENTICATION PROTOCOLS.

28. A formal model of rational exchange and its application to the analysis of Syverson's protocol.

29. Authentication tests and disjoint encryption: A design method for security protocols.

30. Polynomial liveness.

31. Types and effects for asymmetric cryptographic protocols.

32. Embedding agents within the intruder to detect parallel attacks.

33. Probabilistic analysis of an anonymity system.

34. Multiset rewriting and the complexity of bounded security protocols.

35. A compositional logic for proving security properties of protocols.

36. Some attacks upon authenticated group key agreement protocols.

37. Global infrastructure protection system.

38. Strand spaces: proving security protocols correct.

39. Towards a completeness result for model checking of security protocols.

40. Identification of host audit data to detect attacks on low-level IP vulnerabilities.

Catalog

Books, media, physical & digital resources