Sciweavers

44 search results - page 4 / 9
» Version vector protocols implementing session guarantees
Sort
View
ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
15 years 5 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 5 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
70
Voted
WWW
2007
ACM
16 years 9 days ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
99
Voted
ATVA
2007
Springer
101views Hardware» more  ATVA 2007»
15 years 3 months ago
On-the-Fly Model Checking of Fair Non-repudiation Protocols
A fair non-repudiation protocol should guarantee, (1) when a sender sends a message to a receiver, neither the sender nor the receiver can deny having participated in this communic...
Guoqiang Li, Mizuhito Ogawa
LCN
2005
IEEE
15 years 5 months ago
An Advanced QoS Protocol for Mass Content
This paper describes a new network device to be located in network edge nodes. The device can deal with congestion conditions that may arise when, for example, a home or SME custo...
Thomas Dreibholz, Avril IJsselmuiden, John L. Adam...