Sciweavers

274 search results - page 2 / 55
» Formal procedural security modeling and analysis
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
13 years 11 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
IJISEC
2008
101views more  IJISEC 2008»
13 years 5 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
CSFW
2009
IEEE
14 years 3 days ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...
JAR
2008
115views more  JAR 2008»
13 years 5 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
APN
2005
Springer
13 years 11 months ago
Particle Petri Nets for Aircraft Procedure Monitoring Under Uncertainty
In the framework of the study and analysis of new flight procedures, we propose a new Petri net-based formalism to represent both continuous and discrete evolutions and uncertaint...
Charles Lesire, Catherine Tessier