Sciweavers

3088 search results - page 28 / 618
» Multichannel Security Protocols
Sort
View
140
Voted
CSFW
2007
IEEE
15 years 9 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
113
Voted
CSFW
1999
IEEE
15 years 7 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
134
Voted
IASTEDSEA
2004
15 years 4 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
ESORICS
2009
Springer
16 years 3 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
197
Voted
POPL
2002
ACM
16 years 2 months ago
Analyzing security protocols with secrecy types and logic programs
Bruno Blanchet, Martín Abadi