Sciweavers

718 search results - page 4 / 144
» Operational Semantics of Security Protocols
Sort
View
CSFW
2000
IEEE
13 years 9 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
SRDS
1993
IEEE
13 years 9 months ago
A Secure Two Phase Locking Protocol
Rasikan David, Sang Hyuk Son
JAVA
1999
Springer
13 years 9 months ago
The Operational Semantics of a Java Secure Processor
Pieter H. Hartel, Michael J. Butler, Moshe Levy
ESOP
2008
Springer
13 years 7 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
13 years 10 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas