Sciweavers

82 search results - page 1 / 17
» Inductive Proofs of Computational Secrecy
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
13 years 9 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
JCS
2010
112views more  JCS 2010»
13 years 4 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ESORICS
2006
Springer
13 years 9 months ago
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our ...
Michael Backes, Iliano Cervesato, Aaron D. Jaggard...