Sciweavers

1653 search results - page 26 / 331
» Timed analysis of security protocols
Sort
View
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 23 days ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
ENTCS
2006
89views more  ENTCS 2006»
13 years 7 months ago
Towards a Quantitative Analysis of Security Protocols
Pedro Adão, Paulo Mateus, Tiago Reis, Luca ...
IJISEC
2008
46views more  IJISEC 2008»
13 years 7 months ago
A symbolic framework for multi-faceted security protocol analysis
Andrea Bracciali, GianLuigi Ferrari, Emilio Tuosto
IFIP
2010
Springer
13 years 2 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
CSFW
2005
IEEE
14 years 1 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...