A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Nonmonotonic cryptographic protocols
Proceedings The Computer Security Foundations Workshop VII
These are stunning con rmations of the importance of tools for analyzing cryptographic protocols. Rubin ...
Our technique is the rst to allow reasoning about nonmonotonic protocols. These protocols are needed for systems that rely on the deletion of information. ...
This is the rst method proposed for reasoning nonmonotonically about knowledge in cryptographic protocols. ...
doi:10.1109/csfw.1994.315943
dblp:conf/csfw/RubinH94
fatcat:cc7gq7y55fdxjbs6jyjxwljoqe
Page 6716 of Mathematical Reviews Vol. , Issue 2004i
[page]
2004
Mathematical Reviews
In the past few years, a lot of attention has been paid to the use of special logics to analyze cryptographic authentication protocols. ...
It provides a convenient formal language for specifying and reasoning about cryptographic protocol requirements. We also provide an axiomatic inference system, a model of computation and semantics. ...
Formal verification of cryptographic protocols: A survey
[chapter]
1995
Lecture Notes in Computer Science
In this paper we give a survey of the state of the art in the application of formal methods to the analysis of cryptographic protocols. ...
Moser's logic, the only nonmonotonic one considered here, can be used to reason about the way in which beliefs developed through use of cryptographic protocols can be reversed, for example, by learning ...
are in general more tractable than nonmonotonic ones. 2. ...
doi:10.1007/bfb0000430
fatcat:iv53qcjzcjddhcujio6wwlukba
Page 1029 of Mathematical Reviews Vol. , Issue 92b
[page]
1992
Mathematical Reviews
Nait Abdallah, Kernel knowledge versus belt knowledge in default reasoning: a logical approach (pp. 675-686); Li-Yan Yuan, Jia-Huai You and Chenghui Wang, A proof-theoretic framework for nonmonotonic reasoning ...
- alta, On the importance of memory resources in the security of key exchange protocols (extended abstract) (pp. 11-15); S. ...
L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols
[chapter]
2011
Lecture Notes in Computer Science
In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification. ...
The main goal of this work is the proposal of a logic to reason about privacyenhancing monotonic and non-monotonic cryptography protocols. ...
Overview of Our Work The main goal of this work is the proposal of a logic to reason about privacyenhancing cryptographic protocols. ...
doi:10.1007/978-3-642-19348-4_9
fatcat:v7a4nxrm55fz3bd3akfza2jy3i
Page 3513 of Mathematical Reviews Vol. , Issue 2004d
[page]
2004
Mathematical Reviews
(German summary) [|Nonmonotone secret sharing schemes]
Mitt. Math. Sem. Giessen No. 249 (2002), iv+47 pp. ...
Liljana Babinkostova (1-BOISE; Boise, ID)
2004d:94031 94A60 68P25
Vajda, Istvan (H-BUTE-TL; Budapest)
Extraction of random bits for cryptographic purposes. ...
Page 1188 of Mathematical Reviews Vol. , Issue 97B
[page]
1997
Mathematical Reviews
Summary: “The wide applicability of zero-knowledge interactive proofs comes from the possibility of using these proofs as sub- routines in cryptographic protocols. ...
The battery is based on 20 rationality postulates of the types developed in studies of theory change and nonmonotonic reasoning. ...
Evaluating encrypted Boolean functions on encrypted bits: secure decision-making on the black side
2013
Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013
Building upon Barrington's work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel Fixed Structure Group Program construction for secure evaluation eliminates ...
This efficiently parallelizable class includes nonmonotone Boolean expressions of equality, inequality/range, Hamming distance, Boolean matrix multiplication, and kof-m threshold matching operations. ...
The protocol is illustrated in Figure 5 . ...
doi:10.1117/12.2018574
fatcat:d67jee24wjbc7olj2p3rfro6pm
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
2011
Sensors
Confidentiality: It is desirable that a user authentication protocol facilitate confidentiality of messages; as a result, these confidential messages can only be used by authorized users. ...
Nonmonotonic Cryptographic Protocol This sub-section describes the nonmonotonic cryptographic protocol (NCP), which is also known as Rubin Logic. ...
Nonmonotonic Cryptographic Protocol and RUASN Analysis and Verification This section presents, first, the nonmonotonic cryptographic protocol (NCP) [24] , and second, formal analysis and verification ...
doi:10.3390/s110505020
pmid:22163888
pmcid:PMC3231354
fatcat:mbenyrkl45dhbjts6klwzjcxb4
Lightweight Security Protocols for Internet of Things: A Review
2019
International Journal of Advanced Trends in Computer Science and Engineering
Lightweight protocols are characterized by relatively small overhead. ...
The present paper presents a range of various existing as well as proposed lightweight security protocols. ...
Diffie-Hellman Algorithm is an asymmetric cryptography protocol that is designed over public-key cryptographic protocol [15] . ...
doi:10.30534/ijatcse/2019/58832019
fatcat:7wtxzomxcnfu7latkr3bl443e4
Inductive analysis of the Internet protocol TLS
1999
ACM Transactions on Privacy and Security
Session keys are negotiated rather than distributed, and the protocol has many optional parts. ...
TLS, even at an abstract level, is much more complicated than most protocols that researchers have verified. ...
In his Ph.D. thesis, Dietrich [1997] analyses SSL 3.0 using the belief logic NCP (Nonmonotonic Cryptographic Protocols). ...
doi:10.1145/322510.322530
fatcat:f5ej5t6tdnabjcyuk3zwgr45va
A Strong Token Authentication And Cryptography Based Application And Data Access For Cloud Users
2016
International Journal Of Engineering And Computer Science
The cryptographic standards serve multiple algorithms simultaneously.
II. ...
It is important to name protocol type, protocol step, source and destination of a message explicitly in the message. ...
doi:10.18535/ijecs/v4i10.02
fatcat:jujzbcwudvbxfehhplkh3zkf2u
Quantum Computation and Information: Multi-Particle Aspects
2016
Entropy
These actions are mediated by the help of shared quantum entanglement among agents within the framework of communication protocols such as LOCC. ...
They find that the mean lifetime of the superconductive metastable state as a function of the noise intensity is characterized by nonmonotonic behavior. ...
doi:10.3390/e18090339
fatcat:ih46b43vxfghdl5bkxa4je2esu
Formal Support for Standardizing Protocols with State
[chapter]
2015
Lecture Notes in Computer Science
Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. ...
Keywords: protocol analysis tools, stateful protocols, TPM, PKCS#11. ...
Cryptographic version. The cryptographic version of this protocol uses a TPM to achieve the security goal. Here we restrict our attention to a subset of the TPM's functionality. ...
doi:10.1007/978-3-319-27152-1_13
fatcat:4pv5cxooz5dorldzl6gwmcr5w4
D1.7 - Policy, transparency and compliance guidelines V2
2018
Zenodo
Cryptographic features for the ledger infrastructure and fair-exchange protocols will be investigated at a later stage. ...
On the selection of cryptographic primitives. Special care needs to be considered when selecting cryptographic signatures. ...
doi:10.5281/zenodo.2549549
fatcat:5xwvoijxubb7xg4xerjdtekjq4
« Previous
Showing results 1 — 15 out of 160 results