Sciweavers

175 search results - page 1 / 35
» The formal verification of a reintegration protocol
Sort
View
CORR
2011
Springer
216views Education» more  CORR 2011»
12 years 12 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
IFIP
2010
Springer
12 years 11 months ago
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Abstract. We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational eq...
Naipeng Dong, Hugo L. Jonker, Jun Pang
ISICT
2003
13 years 6 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 5 months ago
Bus Protocols: MSC-Based Specifications and Translation into Program of Verification Tool for Formal Verification
Message Sequence Charts (MSCs) are an appealing visual formalism mainly used in the early stages of system design to capture the system requirements. However, if we move towards a...
Kamrul Hasan Talukder