Sciweavers

286 search results - page 6 / 58
» Pitfalls in Formal Reasoning about Security Protocols
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
14 years 9 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
AAAI
2007
14 years 11 months ago
Representing and Reasoning about Commitments in Business Processes
A variety of business relationships in open settings can be understood in terms of the creation and manipulation of commitments among the participants. These include B2C and B2B c...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
ASWEC
2006
IEEE
15 years 3 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
JUCS
2008
113views more  JUCS 2008»
14 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
AAAI
2007
14 years 11 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl