Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data t...