Sciweavers

1653 search results - page 9 / 331
» Timed analysis of security protocols
Sort
View
CSFW
2009
IEEE
14 years 2 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...
ISICT
2003
13 years 8 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
FSEN
2007
Springer
14 years 1 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
CSFW
2000
IEEE
13 years 12 months ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
CCS
2010
ACM
13 years 7 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...