Sciweavers

2687 search results - page 19 / 538
» Formal Analysis of PKCS
Sort
View
107
Voted
CSFW
2002
IEEE
15 years 5 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...
116
Voted
ICCS
2005
Springer
15 years 6 months ago
Using Formal Concept Analysis and Information Flow for Modelling and Sharing Common Semantics: Lessons Learnt and Emergent Issue
Abstract. We have been witnessing an explosion of user involvement in knowledge creation, publication and access both from within and between organisations. This is partly due to t...
Yannis Kalfoglou, W. Marco Schorlemmer
100
Voted
NORDSEC
2009
Springer
15 years 5 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
102
Voted
ISOLA
2010
Springer
14 years 11 months ago
A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL
We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agree...
Anders P. Ravn, Jirí Srba, Saleem Vighio
84
Voted
CSE
2009
IEEE
15 years 7 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...