Sciweavers

1777 search results - page 11 / 356
» Programming Cryptographic Protocols
Sort
View
POPL
2000
ACM
15 years 4 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
103
Voted
CADE
2005
Springer
15 years 12 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
ENTCS
2007
97views more  ENTCS 2007»
14 years 11 months ago
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms,...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
71
Voted
IFIP
2009
Springer
15 years 4 months ago
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties
Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier