Sciweavers

1653 search results - page 26 / 331
» Timed analysis of security protocols
Sort
View
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 8 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
ENTCS
2006
89views more  ENTCS 2006»
15 years 3 months ago
Towards a Quantitative Analysis of Security Protocols
Pedro Adão, Paulo Mateus, Tiago Reis, Luca ...
IJISEC
2008
46views more  IJISEC 2008»
15 years 3 months ago
A symbolic framework for multi-faceted security protocol analysis
Andrea Bracciali, GianLuigi Ferrari, Emilio Tuosto
IFIP
2010
Springer
14 years 10 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
CSFW
2005
IEEE
15 years 8 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...