Sciweavers

609 search results - page 11 / 122
» Modelling and Checking Timed Authentication of Security Prot...
Sort
View
CSFW
2003
IEEE
14 years 1 months ago
Automatic Validation of Protocol Narration
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. W...
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, ...
ESORICS
2003
Springer
14 years 1 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
COMCOM
2011
13 years 2 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
IJFCS
2006
110views more  IJFCS 2006»
13 years 7 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
CCS
2008
ACM
13 years 9 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar