Sciweavers

300 search results - page 12 / 60
» Formal Methods for Smartcard Security
Sort
View
83
Voted
FM
2009
Springer
104views Formal Methods» more  FM 2009»
15 years 10 months ago
Sums and Lovers:  Case Studies in Security, Compositionality and Refinement
Annabelle McIver, Carroll C. Morgan
150
Voted
TPHOL
2009
IEEE
15 years 10 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
134
Voted
JCP
2008
116views more  JCP 2008»
15 years 3 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
134
Voted
PDCAT
2007
Springer
15 years 9 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
138
Voted
JDCTA
2010
187views more  JDCTA 2010»
14 years 10 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang