Sciweavers

208 search results - page 6 / 42
» Automated Security Protocol Analysis With the AVISPA Tool
Sort
View
56
Voted
CAV
2008
Springer
144views Hardware» more  CAV 2008»
14 years 11 months ago
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
A Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper) Michael Backes1,2 , Stefan Lorenz1 , Matteo Maffei1 , and Kim Pecina1 1 Saarland University, Saarbr
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
ADT
2010
14 years 9 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
IAT
2007
IEEE
15 years 3 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 8 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
CNSM
2010
14 years 7 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...