: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
This paper analyses different protocols of session guarantees. Session guarantees (also known as client-centric consistency models) are one of the class of consistency models of r...
Anna Kobusinska, Cezary Sobaniec, Marek Libuda, Da...
This paper proposes a handoff scheme in a wireless access network where IEEE802.11 is used as link layer protocol and Mobile IP as network layer protocol. The scheme uses triggers...
Peter De Cleyn, Nik Van den Wijngaert, Lloren&cced...
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...