Search

Your search keyword '"COMPUTER network protocols"' showing total 40 results
40 results on '"COMPUTER network protocols"'

Search Results

1. StatVerif: Verification of stateful processes.

2. On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.

3. Establishing and preserving protocol security goals.

4. Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.

5. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

6. Analysing TLS in the strand spaces model.

7. Inductive trace properties for computational security.

8. Finite models for formal security proofs.

9. Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.

10. Detecting and preventing type flaws at static time.

11. Adaptively Secure Threshold Signature Scheme in the Standard Model.

12. One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings.

13. What Agents Can Probably Enforce.

14. Simulation of Security Protocols based on Scenarios of Attacks.

15. Secrecy for bounded security protocols with freshness check is NEXPTIME-complete.

16. Timed analysis of security protocols.

17. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.

18. Analysis of probabilistic contract signing.

19. On the impossibility of building secure Cliques-type authenticated group key agreement protocols.

20. A Secure Strong-Password Authentication Protocol.

21. Secure set intersection cardinality with application to association rule mining.

22. A derivation system and compositional logic for security protocols.

23. Non‐interference proof techniques for the analysis of cryptographic protocols.

24. Relating multiset rewriting and process algebras for security protocol analysis.

25. Decidability of context‐explicit security protocols.

26. The faithfulness of abstract protocol analysis: Message authentication.

27. SIMULATION BASED VALIDATION OF AUTHENTICATION PROTOCOLS.

28. A formal model of rational exchange and its application to the analysis of Syverson's protocol.

29. Authentication tests and disjoint encryption: A design method for security protocols.

30. Polynomial liveness.

31. Types and effects for asymmetric cryptographic protocols.

32. Probabilistic analysis of an anonymity system.

33. Embedding agents within the intruder to detect parallel attacks.

34. Multiset rewriting and the complexity of bounded security protocols.

35. Some attacks upon authenticated group key agreement protocols.

36. A compositional logic for proving security properties of protocols.

37. Global infrastructure protection system.

38. Strand spaces: proving security protocols correct.

39. Towards a completeness result for model checking of security protocols.

40. Identification of host audit data to detect attacks on low-level IP vulnerabilities.

Catalog

Books, media, physical & digital resources