Sciweavers

60 search results - page 4 / 12
» Synthesis of attack actions using model checking for the ver...
Sort
View
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 5 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 5 months ago
Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast
Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The paper describes how epistemic mo...
Omar I. Al-Bataineh, Ron van der Meyden
ICSE
2008
IEEE-ACM
14 years 5 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
IFIP
2009
Springer
13 years 2 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
FC
2010
Springer
169views Cryptology» more  FC 2010»
13 years 8 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea