Sciweavers

480 search results - page 12 / 96
» On the verification of automotive protocols
Sort
View
ESOP
2009
Springer
13 years 11 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
IFIP
2009
Springer
13 years 5 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov
IJCSA
2006
95views more  IJCSA 2006»
13 years 7 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
CADE
2008
Springer
14 years 7 months ago
Challenges in the Automated Verification of Security Protocols
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
Hubert Comon-Lundh