Sciweavers

36 search results - page 1 / 8
» Deciding the Correctness of Attacks on Authentication Protoc...
Sort
View
JSW
2008
118views more  JSW 2008»
13 years 4 months ago
Deciding the Correctness of Attacks on Authentication Protocols
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
Anders Moen Hagalisletto
IEEEARES
2007
IEEE
13 years 11 months ago
Errors in Attacks on Authentication Protocols
A tool for automated validation of attacks on authentication protocols has been used to find several flaws and ambiguities in the list of attacks described in the well known rep...
Anders Moen Hagalisletto
IPPS
2008
IEEE
13 years 11 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
FUIN
2007
104views more  FUIN 2007»
13 years 4 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
CADE
2011
Springer
12 years 4 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...