Sciweavers

372 search results - page 12 / 75
» Model Checking Commitment Protocols
Sort
View
AINA
2004
IEEE
15 years 6 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
CORR
2010
Springer
158views Education» more  CORR 2010»
15 years 3 months ago
Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast
Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The paper describes how epistemic mo...
Omar I. Al-Bataineh, Ron van der Meyden
IPPS
2007
IEEE
15 years 9 months ago
J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols
In this paper, we report our work [24, 26] on extending the J-Sim network simulator [13] to be an integrated environment for both simulation and model checking of network protocol...
Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov, J...
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 10 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ATVA
2007
Springer
101views Hardware» more  ATVA 2007»
15 years 7 months ago
On-the-Fly Model Checking of Fair Non-repudiation Protocols
A fair non-repudiation protocol should guarantee, (1) when a sender sends a message to a receiver, neither the sender nor the receiver can deny having participated in this communic...
Guoqiang Li, Mizuhito Ogawa