Sciweavers

95 search results - page 4 / 19
» Simulation based security in the applied pi calculus
Sort
View
CSAC
2006
15 years 1 months ago
Toward a Pi-Calculus Based Verification Tool for Web Services Orchestrations
Abstract. Web services constitute a dynamic field of research about technologies of the Internet. WS-BPEL 2.0, is in the way for becoming a standard for defining Web services orche...
Faisal Abouzaid
AB
2007
Springer
15 years 5 months ago
A Stochastic Pi Calculus for Concurrent Objects
We present SpiCO, a new modeling and simulation language for systems biology. SpiCO is based on the stochastic π-calculus. It supports higher level modeling via multi-profile con...
Céline Kuttler, Cédric Lhoussaine, J...
CCS
2005
ACM
15 years 5 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
CSFW
2008
IEEE
15 years 6 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan
CSFW
2010
IEEE
15 years 3 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...