Sciweavers

1106 search results - page 4 / 222
» Automated Design of Security Protocols
Sort
View
SOCIALCOM
2010
13 years 7 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
AGENTS
2001
Springer
14 years 2 months ago
Designing and executing protocols using the event calculus
Pinar Yolum, Munindar P. Singh
CADE
2008
Springer
14 years 10 months ago
Challenges in the Automated Verification of Security Protocols
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
Hubert Comon-Lundh
CSFW
2008
IEEE
13 years 11 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei