Sciweavers

142 search results - page 4 / 29
» Protocol Algebra
Sort
View
ISCC
2006
IEEE
102views Communications» more  ISCC 2006»
15 years 4 months ago
Protocol Algebra
Anders Moen Hagalisletto
JLP
2008
72views more  JLP 2008»
14 years 10 months ago
Using probabilistic Kleene algebra pKA for protocol verification
A. K. McIver, C. Gonzalia, E. Cohen, Carroll C. Mo...
IPPS
2008
IEEE
15 years 4 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
14 years 12 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
77
Voted
FCT
2003
Springer
15 years 3 months ago
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra ...
Michele Bugliesi, Ambra Ceccato, Sabina Rossi