Sciweavers

1059 search results - page 26 / 212
» Modeling Security Protocols as Games
Sort
View
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 1 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
FSTTCS
2008
Springer
13 years 9 months ago
About models of security protocols
Hubert Comon-Lundh
CSFW
2010
IEEE
14 years 19 days ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ESORICS
2004
Springer
14 years 2 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
ARGMAS
2004
Springer
14 years 2 months ago
Specifying and Implementing a Persuasion Dialogue Game Using Commitments and Arguments
In this paper we propose a new persuasion dialogue game for agent communication. We show how this dialogue game is modeled by a framework based on social commitments and arguments....
Jamal Bentahar, Bernard Moulin, Brahim Chaib-draa