Sciweavers

215 search results - page 1 / 43
» Analyzing Security Protocols Using Time-Bounded Task-PIOAs
Sort
View
DEDS
2008
88views more  DEDS 2008»
13 years 11 months ago
Analyzing Security Protocols Using Time-Bounded Task-PIOAs
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Mos...
IFIP
2010
Springer
13 years 5 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
IASTEDSEA
2004
14 years 12 days ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 2 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
14 years 5 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng