Sciweavers

182 search results - page 30 / 37
» Deterministic Behavioural Models for Concurrency
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
FSTTCS
2003
Springer
15 years 2 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
68
Voted
AAAI
2006
14 years 11 months ago
DNNF-based Belief State Estimation
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
Paul Elliott, Brian C. Williams
CSFW
2005
IEEE
15 years 3 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
WOSP
2000
ACM
15 years 2 months ago
Quantitative system evaluation with DSPNexpress 2000
This paper describes the software package DSPNexpress 2000, a tool for the quantitative evaluation of systems specified in stochastic Petri nets, the Unified Modeling Language (UM...
Christoph Lindemann, Axel Thümmler, Alexander...