Sciweavers

25 search results - page 1 / 5
» A Trace Logic for Local Security Properties
Sort
View
CORR
2004
Springer
88views Education» more  CORR 2004»
13 years 6 months ago
A Trace Logic for Local Security Properties
Ricardo Corin, Antonio Durante, Sandro Etalle, Pie...
CADE
2010
Springer
13 years 7 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
ADHOCNOW
2008
Springer
14 years 18 days ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
14 years 7 days ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
AMAST
2000
Springer
13 years 10 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri