Sciweavers

3 search results - page 1 / 1
» Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Sort
View
ACJ
2006
86views more  ACJ 2006»
13 years 7 months ago
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Siraj A. Shaikh, Vicky J. Bush
CSFW
2005
IEEE
14 years 1 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
CSFW
2002
IEEE
14 years 22 days ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather