Sciweavers

28 search results - page 3 / 6
» The Inductive Approach to Verifying Cryptographic Protocols
Sort
View
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
13 years 11 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
POPL
2009
ACM
14 years 8 months ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
IJFCS
2008
81views more  IJFCS 2008»
13 years 7 months ago
Reachability Analysis in Verification via Supercompilation
Abstract. We present an approach to verification of parameterized systems, which is based on program transformation technique known as supercompilation. In this approach the statem...
Alexei Lisitsa, Andrei P. Nemytykh
JCSS
2006
102views more  JCSS 2006»
13 years 7 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
CSFW
2005
IEEE
14 years 1 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei