Sciweavers

1106 search results - page 4 / 222
» Automated Design of Security Protocols
Sort
View
121
Voted
SOCIALCOM
2010
15 years 1 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
131
Voted
AGENTS
2001
Springer
15 years 8 months ago
Designing and executing protocols using the event calculus
Pinar Yolum, Munindar P. Singh
105
Voted
CCS
1993
ACM
15 years 7 months ago
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
Mihir Bellare, Phillip Rogaway
97
Voted
CADE
2008
Springer
16 years 4 months ago
Challenges in the Automated Verification of Security Protocols
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
Hubert Comon-Lundh
160
Voted
CSFW
2008
IEEE
15 years 5 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei