Sciweavers

2162 search results - page 46 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
FMCAD
2008
Springer
13 years 10 months ago
Going with the Flow: Parameterized Verification Using Message Flows
A message flow is a sequence of messages sent among processors during the execution of a protocol, usually illustrated with something like a message sequence chart. Protocol design...
Murali Talupur, Mark R. Tuttle
CSL
2010
Springer
13 years 9 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
JCM
2006
112views more  JCM 2006»
13 years 8 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
ESIAT
2009
IEEE
13 years 6 months ago
On User Data Protocol of SMS in Remote Monitoring System
This paper looks into the features of SMS (short message service) relevant to building a remote monitoring system. Based on the analysis of SMS, a set of guidelines for customizing...
Yu Zhen, Sun Qiuwei
WISTP
2007
Springer
14 years 2 months ago
Optimistic Non-repudiation Protocol Analysis
Abstract. Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol...
Judson Santiago, Laurent Vigneron