Sciweavers

3115 search results - page 29 / 623
» Synthesizing Secure Protocols
Sort
View
IJISEC
2008
101views more  IJISEC 2008»
13 years 9 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
IJNSEC
2007
115views more  IJNSEC 2007»
13 years 9 months ago
Novel Secure Communication Protocol for Conditional Access System
A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identiļ¬cation scheme to a...
Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao
COMCOM
2000
97views more  COMCOM 2000»
13 years 8 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
SECRYPT
2008
107views Business» more  SECRYPT 2008»
13 years 10 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
EUROSYS
2010
ACM
14 years 6 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā€...
Vitaly Chipounov, George Candea