Sciweavers

5324 search results - page 164 / 1065
» Internet Security Protocols
Sort
View
FOSAD
2009
Springer
15 years 10 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
CCS
2001
ACM
15 years 8 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
ECIS
2001
15 years 5 months ago
Internet Technology Diffusion: Adoption of IPV6
With the explosive growth of the Internet in the 1990s, the scalability of current technologies has become a significant issue. The current version of Internet Protocol version 4 ...
Anat Hovav, Ravi Patnayakuni, David Schuff
ESORICS
2009
Springer
16 years 4 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
ACSAC
2005
IEEE
15 years 9 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens