Cryptographic protocols

Results: 3642



#Item
1On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

Add to Reading List

Source URL: www.volkerroth.com

Language: English - Date: 2007-11-23 00:00:17
    2Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

    Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2010-03-26 06:44:57
      3Secure Cryptographic Protocols for E-commerce Transaction  on the Internet

      Secure Cryptographic Protocols for E-commerce Transaction on the Internet

      Add to Reading List

      Source URL: www.sgs.cityu.edu.hk

      Language: English - Date: 2004-01-08 09:10:43
        4Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

        Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

        Add to Reading List

        Source URL: www-kb.is.s.u-tokyo.ac.jp

        Language: English - Date: 2008-12-22 04:20:35
          5Cryptographic schemes  Protocols Specifications of primitives

          Cryptographic schemes Protocols Specifications of primitives

          Add to Reading List

          Source URL: prosecco.gforge.inria.fr

          Language: English - Date: 2014-11-25 03:59:23
            6Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

            Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

            Add to Reading List

            Source URL: www.chriskarlof.com

            Language: English - Date: 2012-01-02 15:39:33
              7Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

              Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

              Add to Reading List

              Source URL: jeapostrophe.github.io

              - Date: 2018-04-03 12:30:31
                8Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University

                Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University

                Add to Reading List

                Source URL: jeapostrophe.github.io

                - Date: 2018-04-03 12:30:31
                  9Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG  Abstract. Cryptographic protocols are used in distributed systems to

                  Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to

                  Add to Reading List

                  Source URL: www.cl.cam.ac.uk

                  - Date: 2006-07-26 10:17:27
                    10Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡

                    Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-07-21 09:17:49