Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
A Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper) Michael Backes1,2 , Stefan Lorenz1 , Matteo Maffei1 , and Kim Pecina1 1 Saarland University, Saarbr
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
We present a formalism for the automatic verification of security protocols based on multi-agent systems semantics. We give the syntax and semantics of a temporal-epistemic securit...
We extend the partial order reduction algorithm of Clarke et al. [CJM00] to handle branching security protocols, such as optimistic fair exchange protocols. Applications of the pro...