Sciweavers

155 search results - page 2 / 31
» Cryptographic Protocol Analysis of AN.ON
Sort
View
IPPS
2007
IEEE
13 years 11 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland
ICALP
2001
Springer
13 years 9 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
CCS
2001
ACM
13 years 9 months ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
FC
2010
Springer
145views Cryptology» more  FC 2010»
13 years 3 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
MMMACNS
2001
Springer
13 years 9 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows