Sciweavers

3115 search results - page 32 / 623
» Synthesizing Secure Protocols
Sort
View
EUROCRYPT
2001
Springer
14 years 1 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
IEEEARES
2010
IEEE
14 years 3 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif
COMSIS
2006
100views more  COMSIS 2006»
13 years 9 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
14 years 3 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
SAM
2004
151views Hardware» more  SAM 2004»
13 years 10 months ago
Checking Secrecy by Means of Partial Order Reduction
We propose a partial order reduction for model checking security protocols for the secrecy property. Based on this reduction we develop an automatic tool that can check security pr...
Cas J. F. Cremers, Sjouke Mauw