Sciweavers

166 search results - page 5 / 34
» Formal analysis of secure contracting protocol for e-tenderi...
Sort
View
CSFW
2011
IEEE
12 years 8 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
CCS
2010
ACM
13 years 8 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
NORDSEC
2009
Springer
14 years 1 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
OTM
2007
Springer
14 years 2 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
CSFW
2002
IEEE
14 years 1 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...