Sciweavers

208 search results - page 10 / 42
» Automated Security Protocol Analysis With the AVISPA Tool
Sort
View
FCS
2006
14 years 11 months ago
Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security
By far the most important automated tool for network and communications security is encryption, but encryption itself needs security. As we know, many cryptosystems and cryptograp...
Song Y. Yan, Glyn James, Gongyi Wu
99
Voted
IJNSEC
2008
190views more  IJNSEC 2008»
14 years 9 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
81
Voted
IEEEARES
2007
IEEE
15 years 3 months ago
Errors in Attacks on Authentication Protocols
A tool for automated validation of attacks on authentication protocols has been used to find several flaws and ambiguities in the list of attacks described in the well known rep...
Anders Moen Hagalisletto
JAR
2006
107views more  JAR 2006»
14 years 9 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy