Sciweavers

147 search results - page 12 / 30
» An intruder model for verifying liveness in security protoco...
Sort
View
FMCAD
2008
Springer
15 years 3 months ago
Verifying an Arbiter Circuit
Abstract--This paper presents the verification of an asynchronous arbiter modeled at the circuit level with non-linear ordinary differential equations. We use Brockett's annul...
Chao Yan, Mark R. Greenstreet
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 8 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciï¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
ICUMT
2009
14 years 11 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
IEAAIE
2011
Springer
14 years 5 months ago
Model Checking Commitment Protocols
Using model checking to verify that interaction protocols have given properties is widely recognized as an important issue in multiagent systems where autonomous and heterogeneous ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
ACSC
2007
IEEE
15 years 5 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...