Sciweavers

1777 search results - page 11 / 356
» Programming Cryptographic Protocols
Sort
View
POPL
2000
ACM
14 years 28 days ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
CADE
2005
Springer
14 years 9 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
ENTCS
2007
97views more  ENTCS 2007»
13 years 8 months ago
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms,...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
IFIP
2009
Springer
14 years 1 months ago
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties
Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier