Sciweavers

2162 search results - page 5 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ENTCS
2007
97views more  ENTCS 2007»
13 years 7 months ago
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms,...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
AINA
2007
IEEE
13 years 11 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
SEC
2007
13 years 9 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
CSFW
2004
IEEE
13 years 11 months ago
Formal Analysis of Multi-Party Contract Signing
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
Rohit Chadha, Steve Kremer, Andre Scedrov
FUIN
2008
107views more  FUIN 2008»
13 years 7 months ago
Modelling and Simulation of Quantum Teleportation and Dense Coding Using Predicate/Transition-Nets
Reachability analysis is one of the most successful methods used in design and validation of protocols for classical communication, whereas the predicate/transition-net formalism i...
Kimmo Varpaaniemi, Leo Ojala