Cryptographic protocols

Results: 3642



#Item
1

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

Add to Reading List

Source URL: www.volkerroth.com

Language: English - Date: 2007-11-23 00:00:17
    2

    Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2010-03-26 06:44:57
      3

      Secure Cryptographic Protocols for E-commerce Transaction on the Internet

      Add to Reading List

      Source URL: www.sgs.cityu.edu.hk

      Language: English - Date: 2004-01-08 09:10:43
        4

        Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

        Add to Reading List

        Source URL: www-kb.is.s.u-tokyo.ac.jp

        Language: English - Date: 2008-12-22 04:20:35
          5

          Cryptographic schemes Protocols Specifications of primitives

          Add to Reading List

          Source URL: prosecco.gforge.inria.fr

          Language: English - Date: 2014-11-25 03:59:23
            6

            Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

            Add to Reading List

            Source URL: www.chriskarlof.com

            Language: English - Date: 2012-01-02 15:39:33
              7

              Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

              Add to Reading List

              Source URL: jeapostrophe.github.io

              - Date: 2018-04-03 12:30:31
                8

                Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University

                Add to Reading List

                Source URL: jeapostrophe.github.io

                - Date: 2018-04-03 12:30:31
                  9

                  Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to

                  Add to Reading List

                  Source URL: www.cl.cam.ac.uk

                  - Date: 2006-07-26 10:17:27
                    10

                    Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-07-21 09:17:49
                      UPDATE