143
click to vote
CSFW
15 years 5 months ago
2004 IEEE
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
140
click to vote
CSFW
15 years 5 months ago
2004 IEEE
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
139
click to vote
CSFW
15 years 5 months ago
2004 IEEE
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
138
click to vote
CSFW
15 years 5 months ago
2004 IEEE
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
132
click to vote
CSFW
15 years 5 months ago
2004 IEEE
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
|