Sciweavers

361 search results - page 12 / 73
» Composition of Password-Based Protocols
Sort
View
CAISE
1999
Springer
15 years 1 months ago
CPAM, A Protocol for Software Composition
Software composition is critical for building large-scale applications. In this paper, we consider the composition of components that are methods offered by heterogeneous, autonomo...
Laurence Melloul, Dorothea Beringer, Neal Sample, ...
IFIP
2009
Springer
15 years 4 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
PROVSEC
2010
Springer
14 years 7 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
CHARME
2001
Springer
162views Hardware» more  CHARME 2001»
15 years 1 months ago
Parameterized Verification of the FLASH Cache Coherence Protocol by Compositional Model Checking
We consider the formal verification of the cache coherence protocol of the Stanford FLASH multiprocessor for N processors. The proof uses the SMV proof assistant, a proof system ba...
Kenneth L. McMillan