Sciweavers

119 search results - page 2 / 24
» Finite models for formal security proofs
Sort
View
JOC
2007
129views more  JOC 2007»
13 years 5 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
CAV
2009
Springer
106views Hardware» more  CAV 2009»
14 years 5 months ago
Models and Proofs of Protocol Security: A Progress Report
Bruno Blanchet, Hubert Comon-Lundh, Martín ...
CSFW
1999
IEEE
13 years 9 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
DSRT
2008
IEEE
13 years 11 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
FAC
2008
67views more  FAC 2008»
13 years 5 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen