120
click to vote
CSFW
15 years 4 months ago
2009 IEEE
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
114
Voted
CSFW
15 years 4 months ago
2009 IEEE
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
111
click to vote
CSFW
15 years 7 months ago
2009 IEEE
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
111
Voted
CSFW
15 years 7 months ago
2009 IEEE
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
120
Voted
CSFW
15 years 4 months ago
2009 IEEE
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
|