Sciweavers

15 search results - page 3 / 3
» Analysis of an Electronic Voting Protocol in the Applied Pi ...
Sort
View
POPL
2001
ACM
14 years 5 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
CSFW
2010
IEEE
13 years 8 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
JLP
2008
75views more  JLP 2008»
13 years 5 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...
IPPS
2006
IEEE
13 years 11 months ago
Performance analysis of stochastic process algebra models using stochastic simulation
We present a translation of a generic stochastic process algebra model into a form suitable for stochastic simulation. By systematically generating rate equations from a process d...
Jeremy T. Bradley, Stephen T. Gilmore, Nigel Thoma...
CSFW
2012
IEEE
11 years 7 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...