128
click to vote
CSFW
15 years 5 months ago
2009 IEEE
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
125
click to vote
CSFW
15 years 5 months ago
2009 IEEE
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
118
click to vote
CSFW
15 years 8 months ago
2009 IEEE
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
122
click to vote
CSFW
15 years 8 months ago
2009 IEEE
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
130
click to vote
CSFW
15 years 5 months ago
2009 IEEE
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
|