Sciweavers

239 search results - page 13 / 48
» Approaches to Formal Verification of Security Protocols
Sort
View
CCS
2008
ACM
15 years 1 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
ESORICS
2010
Springer
15 years 24 days ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
AIME
2003
Springer
15 years 3 months ago
Experiences in the Formalisation and Verification of Medical Protocols
Abstract. Medical practice protocols or guidelines are statements to assist practitioners and patient decisions about appropriate health care for specific circumstances. In order t...
Mar Marcos, Michael Balser, Annette ten Teije, Fra...
ESORICS
2008
Springer
15 years 1 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 6 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...