Sciweavers

297 search results - page 4 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Relating two formal models of path-vector routing
— This paper unifies two independently developed formalisms for path-vector routing protocols such as the Border Gateway Protocol (BGP), the standard inter-domain routing protoc...
Aaron D. Jaggard, Vijay Ramachandran
ENTCS
2006
145views more  ENTCS 2006»
13 years 7 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
ISICT
2003
13 years 9 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
NORDSEC
2009
Springer
14 years 2 days ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
IPPS
2007
IEEE
14 years 1 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland