Sciweavers

401 search results - page 32 / 81
» Formal Analysis of Meeting Protocols
Sort
View
CEEMAS
2001
Springer
14 years 3 months ago
On BAN Logics for Industrial Security Protocols
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters...
Nesria Agray, Wiebe van der Hoek, Erik P. de Vink
ENTCS
2006
117views more  ENTCS 2006»
13 years 10 months ago
A Formalization of Credit and Responsibility Within the GNDC Schema
We formally define a notion of credit and responsibility within the Generalized Non Deducibility on Compositions framework. We investigate the validity of our definitions through ...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
JDCTA
2010
187views more  JDCTA 2010»
13 years 5 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
ACSAC
2005
IEEE
14 years 4 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
MASCOTS
2007
14 years 6 days ago
PEPA Analysis of MAP Effects in Hierarchical Mobile IPv6
—To overcome the drawbacks of the Mobile IPv6 protocol on handling local mobility management, IETF proposed the HMIPv6 protocol which introduces an intermediate mobility anchor p...
Hao Wang, David I. Laurenson, Jane Hillston