132
click to vote
CSFW
15 years 4 months ago
2004 IEEE
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
127
click to vote
CSFW
15 years 4 months ago
2004 IEEE
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
125
click to vote
CSFW
15 years 4 months ago
2004 IEEE
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
122
click to vote
CSFW
15 years 4 months ago
2004 IEEE
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
117
Voted
CSFW
15 years 4 months ago
2004 IEEE
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
|