Sciweavers

253 search results - page 1 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
ESOP
2004
Springer
13 years 10 months ago
Compositional Analysis of Authentication Protocols
ESOP 2004, LNCS 2986, pages 140–154, 2004. c Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We d...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
IANDC
2008
120views more  IANDC 2008»
13 years 4 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
JCS
2007
120views more  JCS 2007»
13 years 4 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
CCS
2004
ACM
13 years 10 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...