Sciweavers

14 search results - page 2 / 3
» Cryptographic Protocol Synthesis and Verification for Multip...
Sort
View
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 6 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet
COORDINATION
2010
Springer
13 years 4 months ago
Efficient Session Type Guided Distributed Interaction
Abstract. Recently, there has been much interest in multi-party session types (MPSTs) as a means of rigorously specifying protocols for interaction among multiple distributed parti...
K. C. Sivaramakrishnan, Karthik Nagaraj, Lukasz Zi...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 1 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CONCUR
2010
Springer
13 years 7 months ago
A Theory of Design-by-Contract for Distributed Multiparty Interactions
Reliability is a critical issue in many multi-organizational distributed applications, be they web services, financial protocols, scientific computing infrastructure, and software ...
Laura Bocchi, Kohei Honda, Emilio Tuosto, Nobuko Y...
CCS
2008
ACM
13 years 8 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung