Sciweavers

1106 search results - page 7 / 222
» Automated Design of Security Protocols
Sort
View
64
Voted
DAC
2004
ACM
15 years 10 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
82
Voted
CAV
2005
Springer
196views Hardware» more  CAV 2005»
15 years 3 months ago
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Alessandro Armando, David A. Basin, Yohan Boichut,...
JAR
2006
63views more  JAR 2006»
14 years 9 months ago
Automated Reasoning for Security Protocol Analysis
Alessandro Armando, David A. Basin, Jorge Cu&eacut...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 8 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
VIZSEC
2005
Springer
15 years 3 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...