Web services are loosely coupled software components that are published, discovered, and invoked across the Web. As the use of Web services grows, in order to correctly interact w...
We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (fo...
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...