Sciweavers

218 search results - page 7 / 44
» Preservation of epistemic properties in security protocol im...
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
13 years 7 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 7 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
CONCUR
2005
Springer
14 years 1 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
CCS
2010
ACM
13 years 5 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin