Sciweavers

46 search results - page 1 / 10
» Intruder Theories (Ongoing Work)
Sort
View
FOSSACS
2004
Springer
13 years 10 months ago
Intruder Theories (Ongoing Work)
Hubert Comon-Lundh
IANDC
2008
150views more  IANDC 2008»
13 years 4 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
MKM
2007
Springer
13 years 11 months ago
Towards Constructive Homological Algebra in Type Theory
This paper reports on ongoing work on the project of representing the Kenzo system [15] in type theory [11].
Thierry Coquand, Arnaud Spiwack
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 5 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...