Sciweavers

343 search results - page 7 / 69
» Formal security analysis of PKCS
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 1 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
CAISE
2006
Springer
14 years 1 months ago
Validation of Regulation Documents by Automated Analysis of Formal Models
Abstract. The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different technique...
Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie V...
SERVICES
2010
130views more  SERVICES 2010»
13 years 11 months ago
Heterogeneous Service Selection Based on Formal Concept Analysis
In this paper, we propose an approach based on Formal Concept Analysis in order to organize the services registry at runtime and to allow the "best" service selection am...
Stéphanie Chollet, Vincent Lestideau, Phili...
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 3 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya