Sciweavers

1059 search results - page 26 / 212
» Modeling Security Protocols as Games
Sort
View
86
Voted
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 5 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
FSTTCS
2008
Springer
15 years 1 months ago
About models of security protocols
Hubert Comon-Lundh
113
Voted
CSFW
2010
IEEE
15 years 4 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ESORICS
2004
Springer
15 years 6 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
ARGMAS
2004
Springer
15 years 6 months ago
Specifying and Implementing a Persuasion Dialogue Game Using Commitments and Arguments
In this paper we propose a new persuasion dialogue game for agent communication. We show how this dialogue game is modeled by a framework based on social commitments and arguments....
Jamal Bentahar, Bernard Moulin, Brahim Chaib-draa