Search
Now showing items 1-2 of 2
Security analysis of two fair exchange protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
Modeling and detecting attacks against key agreement protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
Key agreement protocols establish a shared secret key between two or more communicating
parties willing to exchange data over insecure channels using symmetric key cryptography.
Based on the number of members involved ...