Filters








238,122 Hits in 3.0 sec

Secure Protocol Transformations [chapter]

Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In the rich literature of secure multi-party computation (MPC), several important results rely on "protocol transformations," whereby protocols from one model of MPC are transformed to protocols from another  ...  over a previous protocol of Damgård et al. (2010) by improving the dependence on the security parameter from linear to polylogarithmic; -An efficient new transformation from passive-secure two-party computation  ...  Then, we show how a protocol with partially-identifiable-abort security can be transformed to one with full-security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53008-5_15">doi:10.1007/978-3-662-53008-5_15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kyj37x6245benbwwzx7wshghvi">fatcat:kyj37x6245benbwwzx7wshghvi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170711080132/http://eprint.iacr.org/2016/456.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/56/4156d0670cf8948b8f73e5ef5beb5e86180303f2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53008-5_15"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Sound Security Protocol Transformations [chapter]

Binh Thanh Nguyen, Christoph Sprenger
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We propose a class of protocol transformations, which can be used to (1) develop (families of) security protocols by refinement and (2) abstract existing protocols to increase the efficiency of verification  ...  We prove the soundness of these transformations with respect to an expressive security property specification language covering secrecy and authentication properties.  ...  In this work, we propose a class of syntactic protocol transformations covering a wide range of protocols and security properties.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-36830-1_5">doi:10.1007/978-3-642-36830-1_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rdldxp3mb5cfjnxv24pekhlpru">fatcat:rdldxp3mb5cfjnxv24pekhlpru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922000039/http://people.inf.ethz.ch/csprenge/Publications_files/post13_final_1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/de/b5/deb50f35c4a34b727fd57a5f4d705da09393284b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-36830-1_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure protocol transformation via "expansion"

Alain Mayer, Moti Yung
<span title="">1999</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 6th ACM conference on Computer and communications security - CCS &#39;99</a> </i> &nbsp;
It enables us to achmve efficmnt and secure protocols for a large variety of group tasks.  ...  The approach, whmh we call secure protocol expanswn, maintains the efficiency of the basra design and at the same t~me preserves provable security.  ...  We now show how to transform any secure protocol with Consistency Re-qmrement 2 (such as the [BR93] protocol) into a secure protocol with Consistency Requirement 1.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/319709.319721">doi:10.1145/319709.319721</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/MayerY99.html">dblp:conf/ccs/MayerY99</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jc5ehqjbkzb4vpppv2olrq6pxq">fatcat:jc5ehqjbkzb4vpppv2olrq6pxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217065532/https://static.aminer.org/pdf/20170130/pdfs/ccs/10bmuofr2q4hxp89glzkymqwejvsvg6i.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/56/43/56431fa5847c5bceacc8c2d5cec022f7d3a63924.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/319709.319721"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Security Goals and Protocol Transformations [chapter]

Joshua D. Guttman
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Cryptographic protocol designers work incrementally. Having achieved some goals for confidentiality and authentication in a protocol Π1, they transform it to a richer Π2 to achieve new goals.  ...  The strand space protocol analysis tool cpsa generates some of the ltss used.  ...  Thm. 2 says how to show that a transformed protocol satisfies some security goals, when the source protocol did.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27375-9_8">doi:10.1007/978-3-642-27375-9_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/53w5cbybyzgz5gvhde7bafvcoi">fatcat:53w5cbybyzgz5gvhde7bafvcoi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810004658/http://web.cs.wpi.edu/~guttman/pubs/logic+transformations.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/26/922600c8701c90900ead4e0e3b3d1bb1c5e50ec5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27375-9_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the Optimality of Basis Transformations to Secure Entanglement Swapping Based QKD Protocols [article]

Stefan Schauer, Martin Suda
<span title="2013-07-22">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this article, we discuss the optimality of basis transformations as a security measure for quantum key distribution protocols based on entanglement swapping.  ...  This is less than half the information compared to other protocols using a Hadamard operation and thus represents an advantage regarding the security of entanglement swapping based protocols.  ...  The security of these protocols has been discussed in depth and security proofs have been given for example in [9] [10] [11] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1307.5646v1">arXiv:1307.5646v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tqh7oyvebze2pigjn6qgxaxhne">fatcat:tqh7oyvebze2pigjn6qgxaxhne</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200929181144/https://arxiv.org/pdf/1307.5646v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b7/75/b775518058fdfaada7b34d25b746e72bbc2501ab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1307.5646v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes [article]

André Chailloux
<span title="2021-03-16">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
While the classical security of this transformation is well understood, it is only very recently that generic results for the quantum case have been proposed [DFMS19,LZ19].  ...  Applying the Fiat-Shamir transform on identification schemes is one of the main ways of constructing signature schemes.  ...  non-interactive protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1906.05415v6">arXiv:1906.05415v6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xe5jsgez7rfyve5zckh3nzkake">fatcat:xe5jsgez7rfyve5zckh3nzkake</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210318004253/https://arxiv.org/pdf/1906.05415v6.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/73/22/732294bb4fbb7576424d40aca1a4718c661194c3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1906.05415v6" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols [chapter]

Giorgio Delzanno, Sandro Etalle
<span title="">2002</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols.  ...  Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have  ...  Proof Theoretic Specification of Security Protocols The Needham-Schroeder Protocol As a working example, we will consider the security protocol based on public-key cryptography proposed by Needham and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45607-4_5">doi:10.1007/3-540-45607-4_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ywc6teis6zec7keteoce5hvyny">fatcat:ywc6teis6zec7keteoce5hvyny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061009234827/http://eprints.eemcs.utwente.nl/947/01/de02lopstr.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/2e/522e00928db13218a642cebff7a38e40031c498c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45607-4_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange

Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
<span title="2007-10-03">2007</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qj6jzeossfhihfshwf7nb7lbcq" style="color: black;">Theory of Computing Systems</a> </i> &nbsp;
The transformation protocol can allow two players to share an unconditionally secure secret key using a random deal of cards.  ...  This paper improves the transformation protocol and gives a necessary and sufficient condition for the resulting protocol to succeed.  ...  This combining is, however, not secure because the acquired portion is not opaque, as follows.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00224-007-9052-3">doi:10.1007/s00224-007-9052-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7sdkywa62rfbvdz63pzvwo6mji">fatcat:7sdkywa62rfbvdz63pzvwo6mji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809080936/http://www.ecei.tohoku.ac.jp/alg/nishizeki/sub/j/DVD/PDF_J/J171.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/0a/b90acd2bf638c0b36854d3563347bb88d676166e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00224-007-9052-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Protocol misidentification made easy with format-transforming encryption

Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS &#39;13</a> </i> &nbsp;
protocol based on packet contents.  ...  Our approach uses a new cryptographic primitive called format-transforming encryption (FTE), which, intuitively, extends conventional symmetric encryption with the ability to transform the ciphertext into  ...  We explored HTTP [16] , HTTPS [13] , secure copy (SCP) [54] , and Tor [14] as source protocols: the choice of source protocol does not influence our results.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516657">doi:10.1145/2508859.2516657</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/DyerCRS13.html">dblp:conf/ccs/DyerCRS13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zb26htdownes5fccucydz5qlx4">fatcat:zb26htdownes5fccucydz5qlx4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160305125545/http://freehaven.net/anonbib/cache/ccs2013-fte.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2b/64/2b642e3eb200e57f42b5430fc097f7e2a645a913.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516657"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Improving Security of RFID Authentication Protocol Based on Fast Fourier Transform and Deoxyribonucleic Acid

Vibhu Grewal
<span title="2017-10-30">2017</span> <i title="Advance Academic Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/morgzaixj5hsjghb6it2id5lgy" style="color: black;">International Journal of Advanced Research in Computer Science and Software Engineering</a> </i> &nbsp;
Our proposed protocol is highly secure and its strength is based on FFT and DNA encoding rules.  ...  In contrast, various attacks and security threats cause to RFID system.  ...  METHODOLOGY This paper proposes a new FFT and DNA based mutual authentication protocol that fulfils the RFID security requirements.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23956/ijarcsse.v7i10.448">doi:10.23956/ijarcsse.v7i10.448</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eiyeicrpgzcijef6sgmdwl346e">fatcat:eiyeicrpgzcijef6sgmdwl346e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722005403/http://ijarcsse.com/index.php/ijarcsse/article/download/448/214" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/5c/8c5ce9e079019c26875152c0d1e71394f380b637.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23956/ijarcsse.v7i10.448"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Realist Process Evaluation of the implementation and impact of an organisational cultural transformation programme in the Children and Young People's Secure Estate (CYPSE) in England: study protocol

Sophie D'Souza, Rebecca Lane, Jenna Jacob, Maria Livanou, Wendy Riches, Andrew Rogers, Roz Ullman, Anisatu Rashid, Rosie Singleton, James Wheeler, Dickon Bevington, Jessica Deighton (+4 others)
<span title="2021-05-28">2021</span> <i title="BMJ"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cadiaxy7y5alle7oylyd7rqmnu" style="color: black;">BMJ Open</a> </i> &nbsp;
This paper aims to present the protocol for a national cohort study examining the impact and implementation of this cultural transformation programme.Methods and analysisA mixed-methods realist evaluation  ...  To address this, the Framework for Integrated Care (SECURE STAIRS) is being implemented in the Children and Young People's Secure Estate: a 'whole systems' approach to support secure settings to develop  ...  He also acts in an advisory, non-decisionmaking role to the national evaluation of SECURE STAIRS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1136/bmjopen-2020-045680">doi:10.1136/bmjopen-2020-045680</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34049914">pmid:34049914</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hq7ahkslgjhdhjiplgh5776gme">fatcat:hq7ahkslgjhdhjiplgh5776gme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210715222925/https://eprints.kingston.ac.uk/id/eprint/49216/1/Livanou-M-49216-VoR.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a1/86/a18692fd21691af01913e5ca2b263d74ef7c426c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1136/bmjopen-2020-045680"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> bmj.org </button> </a>

Robustness of Optimal Basis Transformations to Secure Entanglement Swapping Based QKD Protocols

Stefan Schauer, Martin Suda
<span class="release-stage">unpublished</span>
In this article, we discuss the optimality of basis transformations as a security measure for quantum key distribution protocols based on entanglement swapping as well as the robustness of these basis  ...  This is less than half the information compared to other protocols using a Hadamard operation and thus represents an advantage regarding the security of entanglement swapping based protocols.  ...  A basic technique to secure a QKD protocol is to use a basis transformation, usually a Hadamard operation, to make it easier to detect an adversary.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3a3nwaucofawja7p2tjnfv4d74">fatcat:3a3nwaucofawja7p2tjnfv4d74</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180413042231/http://www.thinkmind.org/download.php?articleid=sysmea_v8_n12_2015_12" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/dc/1cdc6c32b743548e9cf06cbdafe96b26b3ea68ed.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Automatic Proofs of Protocols via Program Transformation [chapter]

Fabio Fioravanti, Alberto Pettorossi, Maurizio Proietti
<i title="Springer-Verlag"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/unhbjdvjtfdulc5gmt3rlyjey4" style="color: black;">Advances in Soft Computing</a> </i> &nbsp;
Our transformation method consists of a set of rules and an automatic strategy that guides the application of the rules.  ...  Our method is sound for verifying properties of protocols that are expressible in the CTL logic [5] .  ...  Transformation Rules and Strategies for the Verication of Protocols In this section we describe our method for verifying temporal properties of protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-32370-8_7">doi:10.1007/3-540-32370-8_7</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/msras/FioravantiPP04.html">dblp:conf/msras/FioravantiPP04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bzpdxt25b5bxzhtdrlekavlfym">fatcat:bzpdxt25b5bxzhtdrlekavlfym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705120855/http://www.iasi.cnr.it/%7Eproietti/papers/FioPetPro_MSRAS04.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/a6/f2a66cc156eb1974ecc79189f461ef00527decb3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-32370-8_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Evolving Fast Fourier Transform and Deoxyribonucleic Acid for security of RFID based authentication protocol

Vibhu, Harpreet Bajaj
<i > International Research Journal of Engineering and Technology (IRJET) </i> &nbsp; <span class="release-stage">unpublished</span>
RFID system is vulnerable to various security threats and attacks.  ...  The aim of our paper is to make a hybrid technique by combining Fast Fourier Transform (FFT) and Deoxyribonucleic acid (DNA) sequence operations.Our proposed technique is different from existing technique  ...  To make this communication secure, will apply fast fourier transform (FFT) on the transformed signal so that no hacker or cracker can crack the data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5mtlln6k4vh75eqdloeh2i6jga">fatcat:5mtlln6k4vh75eqdloeh2i6jga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180501040052/https://irjet.net/archives/V4/i10/IRJET-V4I10223.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c6/d1/c6d14e153ab762673246597a0bc8d701effd29ad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Security Enhancements by OR-Proof in Identity-Based Identification [chapter]

Atsushi Fujioka, Taiichi Saito, Keita Xagawa
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The transformations can convert an IBI protocol, which satisfies a property similar to the Σ-protocol and is secure against impersonation under passive attacks, to one secure against impersonation under  ...  We investigate three security enhancement transformations, based on the well known OR-proof technique, in identity-based identification (IBI) protocols and show a required condition of the underlying IBI  ...  The DIdk transformation can convert an adapt-id-imp-pa secure HIBI protocol into an adapt-id-imp-ca secure one.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-31284-7_9">doi:10.1007/978-3-642-31284-7_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m222ca65ynh6zpc3ne2tksr55i">fatcat:m222ca65ynh6zpc3ne2tksr55i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200324204016/https://rd.springer.com/content/pdf/10.1007%2F978-3-642-31284-7_9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/97/bb978827781d322895559203c69793a959fdfd37.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-31284-7_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 238,122 results