Sciweavers

372 search results - page 29 / 75
» Model Checking Commitment Protocols
Sort
View
ASWEC
2006
IEEE
14 years 2 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
SEFM
2007
IEEE
14 years 2 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
SAINT
2002
IEEE
14 years 1 months ago
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshin...
Li Cheng, Wang Weinong
CTRSA
2006
Springer
156views Cryptology» more  CTRSA 2006»
14 years 11 days ago
Universally Composable Oblivious Transfer in the Multi-party Setting
We construct efficient universally composable oblivious transfer protocols in the multi-party setting for honest majorities. Unlike previous proposals our protocols are designed in...
Marc Fischlin
VMCAI
2005
Springer
14 years 2 months ago
Model Checking of Systems Employing Commutative Functions
Abstract. The paper presents methods for model checking a class of possibly infinite state concurrent programs using various types of bi-simulation reductions. The proposed method...
A. Prasad Sistla, Min Zhou, Xiaodong Wang