Sciweavers

343 search results - page 12 / 69
» Formal security analysis of PKCS
Sort
View
DBSEC
2008
188views Database» more  DBSEC 2008»
14 years 11 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
NORDSEC
2009
Springer
15 years 2 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
77
Voted
IFIP
2009
Springer
14 years 7 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
OTM
2007
Springer
15 years 3 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ICCSA
2005
Springer
15 years 3 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...