Sciweavers

18 search results - page 2 / 4
» Symbolic Model Checking the Knowledge of the Dining Cryptogr...
Sort
View
ESORICS
2005
Springer
13 years 10 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
SPIN
2001
Springer
13 years 9 months ago
Transformations for Model Checking Distributed Java Programs
Abstract. This paper describes three program transformations that extend the scope of model checkers for Java programs to include distributed programs, i.e., multi-process programs...
Scott D. Stoller, Yanhong A. Liu
TYPES
2004
Springer
13 years 10 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
13 years 6 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
AAAI
2004
13 years 6 months ago
Model Checking Temporal Logics of Knowledge in Distributed Systems
Model checking is a promising approach to automatic verification, which has concentrated on specification expressed in temporal logic. Comparatively little attention has been give...
Kaile Su