Sciweavers

1414 search results - page 2 / 283
» Combining Intruder Theories
Sort
View
LICS
2003
IEEE
13 years 10 months ago
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect ...
Hubert Comon-Lundh, Vitaly Shmatikov
ICRA
2010
IEEE
215views Robotics» more  ICRA 2010»
13 years 3 months ago
Moving game theoretical patrolling strategies from theory to practice: An USARSim simulation
— Game theoretical approaches have been recently used to develop patrolling strategies for mobile robots. The idea is that the patroller and the intruder play a game, whose outco...
Francesco Amigoni, Nicola Basilico, Nicola Gatti, ...
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
FOSSACS
2004
Springer
13 years 10 months ago
Intruder Theories (Ongoing Work)
Hubert Comon-Lundh