Sciweavers

3504 search results - page 66 / 701
» Secure protocol composition
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
JCS
2007
120views more  JCS 2007»
14 years 11 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 6 months ago
Application Composition in the SIP Servlet Environment
—The SIP servlet standard is a popular Java application programming interface (API) for developing and deploying Session Initiation Protocol (SIP) applications in Voice over IP (...
Eric Cheung, K. Hal Purdy
CSFW
2003
IEEE
15 years 5 months ago
Automatic Validation of Protocol Narration
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. W...
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, ...
CCS
1998
ACM
15 years 4 months ago
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
Bruce Schneier, Mudge