Sciweavers

1490 search results - page 90 / 298
» The Logic of Authentication Protocols
Sort
View
AGENTCL
2003
Springer
14 years 2 months ago
Logic-Based Agent Communication Protocols
Abstract. An agent communication protocol specifies the rules of interaction governing a dialogue between agents in a multiagent system. In non-cooperative interactions (such as n...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...
CEEMAS
2001
Springer
14 years 1 months ago
On BAN Logics for Industrial Security Protocols
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters...
Nesria Agray, Wiebe van der Hoek, Erik P. de Vink
ESAS
2004
Springer
14 years 2 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
APN
2008
Springer
13 years 11 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
FORTE
2004
13 years 10 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber