Sciweavers

297 search results - page 2 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 27 days ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
CSFW
2012
IEEE
11 years 7 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
ACSW
2006
13 years 6 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
13 years 11 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
FC
2005
Springer
134views Cryptology» more  FC 2005»
13 years 11 months ago
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model
Abstract. A multi-party fair exchange protocol is a cryptographic protocol allowing several parties to exchange commodities in such a way that everyone gives an item away if and on...
Aybek Mukhamedov, Steve Kremer, Eike Ritter