Sciweavers

12 search results - page 1 / 3
» csfw 2000
Sort
View
CSFW
2000
IEEE
13 years 9 months ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
CSFW
2000
IEEE
13 years 9 months ago
Local Names in SPKI/SDSI
We analyze the notion of “local names” in SPKI/SDSI. By interpreting local names as distributed groups, we develop a simple logic program for SPKI/SDSI’s linked localname sc...
Ninghui Li
CSFW
2000
IEEE
13 years 9 months ago
Reasoning about Secrecy for Active Networks
In this paper we develop a language of mobile agents called uPLAN for describing the capabilities of active (programmable) networks. We use a formal semantics for uPLAN to demonst...
Pankaj Kakkar, Carl A. Gunter, Martín Abadi
CSFW
2000
IEEE
13 years 9 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
CSFW
2000
IEEE
13 years 8 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider