Sciweavers

1679 search results - page 1 / 336
» Security Properties and CSP
Sort
View
72
Voted
ESORICS
2000
Springer
15 years 1 months ago
Analysing Time Dependent Security Properties in CSP Using PVS
Neil Evans, Steve Schneider
78
Voted
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 2 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
ESORICS
2010
Springer
14 years 11 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
104
Voted
CSFW
1997
IEEE
15 years 2 months ago
Verifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by ...
Steve Schneider
86
Voted
AINA
2004
IEEE
15 years 1 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi