default search action
SSR 2014: London, UK
- Liqun Chen
, Chris J. Mitchell
:
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Lecture Notes in Computer Science 8893, Springer 2014, ISBN 978-3-319-14053-7
Cryptographic Evaluation
- Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. 1-25 - Feng Hao
, Siamak Fayyaz Shahandashti
:
The SPEKE Protocol Revisited. 26-38 - Christopher W. Brown, Michael Jenkins:
Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected Web. 39-56
Standards Development
- Phillip H. Griffin:
Standardization Transparency - An Out of Body Experience. 57-68 - Jinwoo Lee, Pil Joong Lee:
Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode. 69-78 - Duncan Garrett, Michael Ward:
Blinded Diffie-Hellman - Preventing Eavesdroppers from Tracking Payments. 79-92
Analysis with Formal Methods
- Joshua D. Guttman
, Moses D. Liskov, Paul D. Rowe:
Security Goals and Evolving Standards. 93-110 - Antonio González-Burgueño, Sonia Santiago
, Santiago Escobar
, Catherine Meadows, José Meseguer:
Analysis of the IBM CCA Security API Protocols in Maude-NPA. 111-130 - Efstathios Stathakidis, Steve A. Schneider
, James Heather:
Robustness Modelling and Verification of a Mix Net Protocol. 131-150
Potential Future Areas of Standardisation
- Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:
Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping. 151-166 - Mark Manulis, Douglas Stebila
, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. 167-189 - Nils Fleischhacker
, Mark Manulis, Amir Azodi:
A Modular Framework for Multi-Factor Authentication and Key Exchange. 190-214
Improving Existing Standards
- Cas Cremers, Marko Horvat:
Improving the ISO/IEC 11770 Standard for Key Management Techniques. 215-235 - Britta Hale
, Colin Boyd:
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. 236-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.