Results 91 to 100 of about 6,594 (201)
Universally composable security: a new paradigm for cryptographic protocols [PDF]
Ran Canetti
openalex +1 more source
Constraint solving for bounded-process cryptographic protocol analysis [PDF]
Jonathan K. Millen, Vitaly Shmatikov
openalex +1 more source
A Calculus for Cryptographic Protocols: The Spi Calculus
Martı́n Abadi, Andrew D. Gordon
openalex +1 more source
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj
Cryptographic key distribution and authentication protocols for secure group communication
Andrew Hutchison, Kurt Bauknecht
openalex +1 more source
Language, Semantics, and Methods for Cryptographic Protocols
Federico Crazzolara, Glynn Winskel
openalex +2 more sources
Applications of Term Rewriting to Cryptographic Protocol Analysis (overview of the invited talk)
Jonathan K. Millen
openalex +1 more source
VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS
The possibility of using colored Petri nets for the analysis of key distribution cryptographic protocols as an example of symmetric Needham—Schroeder protocol is reviewed and evaluated.
Nadezhda S. Mogilevskaya+1 more
doaj