Sciweavers

460 search results - page 7 / 92
» Heuristic Methods for Security Protocols
Sort
View
CSFW
1999
IEEE
13 years 12 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
AINA
2007
IEEE
14 years 1 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 25 days ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
HCI
2007
13 years 9 months ago
Evaluating Usability Evaluation Methods: Criteria, Method and a Case Study
The paper proposes an approach to comparative usability evaluation that incorporates important relevant criteria identified in previous work. It applies the proposed approach to a ...
Panayiotis Koutsabasis, Thomas Spyrou, John Darzen...
ICFEM
2003
Springer
14 years 24 days ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone