Sciweavers

526 search results - page 4 / 106
» A Z Based Approach to Verifying Security Protocols
Sort
View
ICUMT
2009
13 years 5 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
ACISP
2004
Springer
13 years 11 months ago
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
Abstract. In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol re...
Gildas Avoine, Serge Vaudenay
SEFM
2007
IEEE
14 years 1 months ago
Verifying the Mondex Case Study
The Mondex Case study is still the most substantial contribution to the Grand Challenge repository. It has been the target of a number of formal verification efforts. Those effor...
Peter H. Schmitt, Isabel Tonin
ESORICS
2010
Springer
13 years 8 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
MIDDLEWARE
2009
Springer
14 years 2 months ago
Automatic Generation of Network Protocol Gateways
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via ...
Yérom-David Bromberg, Laurent Réveil...