Sciweavers

79 search results - page 2 / 16
» A Logic of Authentication
Sort
View
SOSP
1989
ACM
13 years 7 months ago
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Nee...
CD
2004
Springer
13 years 11 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 1 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
FORTE
2004
13 years 7 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
AAI
2010
94views more  AAI 2010»
13 years 1 months ago
Sequence-Indexed Linear-Time Temporal Logic: Proof System and Application
In this paper, we propose a proof system for reasoning on certain specifications of secure authentication systems. For this purpose, a new logic, sequence-indexed linear-time temp...
Ken Kaneiwa, Norihiro Kamide