Sciweavers

3 search results - page 1 / 1
» Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Sort
View
CSFW
2005
IEEE
13 years 10 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
CSFW
2002
IEEE
13 years 9 months ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather