Sciweavers

1106 search results - page 7 / 222
» Automated Design of Security Protocols
Sort
View
DAC
2004
ACM
14 years 10 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
CAV
2005
Springer
196views Hardware» more  CAV 2005»
14 years 3 months ago
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Alessandro Armando, David A. Basin, Yohan Boichut,...
JAR
2006
63views more  JAR 2006»
13 years 9 months ago
Automated Reasoning for Security Protocol Analysis
Alessandro Armando, David A. Basin, Jorge Cu&eacut...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
13 years 8 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
VIZSEC
2005
Springer
14 years 3 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...