Sciweavers

1653 search results - page 9 / 331
» Timed analysis of security protocols
Sort
View
CSFW
2009
IEEE
15 years 4 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
76
Voted
FSEN
2007
Springer
15 years 3 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
CSFW
2000
IEEE
15 years 2 months ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
60
Voted
CCS
2010
ACM
14 years 10 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...