Sciweavers

155 search results - page 4 / 31
» Transducer-based analysis of cryptographic protocols
Sort
View
102
Voted
STACS
2004
Springer
15 years 9 months ago
Automata-Based Analysis of Recursive Cryptographic Protocols
Ralf Küsters, Thomas Wilke
IFIP
2009
Springer
15 years 10 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
136
Voted
ENTCS
2007
97views more  ENTCS 2007»
15 years 3 months ago
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms,...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...