Sciweavers

4305 search results - page 41 / 861
» Analysing Protocol Implementations
Sort
View
ECEASST
2011
344views ECommerce» more  ECEASST 2011»
13 years 3 months ago
IBR-DTN: A lightweight, modular and highly portable Bundle Protocol implementation
Sebastian Schildt, Johannes Morgenroth, Wolf-Basti...
GC
2004
Springer
14 years 2 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 1 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
ESORICS
2007
Springer
14 years 3 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
CSFW
1998
IEEE
14 years 1 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider