Sciweavers

4305 search results - page 41 / 861
» Analysing Protocol Implementations
Sort
View
ECEASST
2011
344views ECommerce» more  ECEASST 2011»
14 years 12 months ago
IBR-DTN: A lightweight, modular and highly portable Bundle Protocol implementation
Sebastian Schildt, Johannes Morgenroth, Wolf-Basti...
137
Voted
GC
2004
Springer
15 years 10 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
136
Voted
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 9 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
ESORICS
2007
Springer
15 years 11 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
CSFW
1998
IEEE
15 years 9 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider