Sciweavers

5324 search results - page 162 / 1065
» Internet Security Protocols
Sort
View
CSFW
2004
IEEE
15 years 7 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
140
Voted
CCS
2008
ACM
15 years 6 months ago
Type-checking zero-knowledge
This paper presents the first type system for statically analyzing security protocols that are based on zero-knowledge proofs. We show how several properties offered by zero-knowl...
Michael Backes, Catalin Hritcu, Matteo Maffei
JTAER
2008
82views more  JTAER 2008»
15 years 3 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
CAV
2008
Springer
144views Hardware» more  CAV 2008»
15 years 6 months ago
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
A Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper) Michael Backes1,2 , Stefan Lorenz1 , Matteo Maffei1 , and Kim Pecina1 1 Saarland University, Saarbr
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
FUIN
2008
103views more  FUIN 2008»
15 years 4 months ago
LDYIS: a Framework for Model Checking Security Protocols
We present a formalism for the automatic verification of security protocols based on multi-agent systems semantics. We give the syntax and semantics of a temporal-epistemic securit...
Alessio Lomuscio, Wojciech Penczek