Sciweavers

103 search results - page 1 / 21
» Verified Interoperable Implementations of Security Protocols
Sort
View
CSFW
2006
IEEE
13 years 10 months ago
Verified Interoperable Implementations of Security Protocols
Karthikeyan Bhargavan, Cédric Fournet, Andr...
P2P
2008
IEEE
14 years 1 months ago
Proactive Role Discovery in Mediator-Free Environments
The rapid proliferation of Internet and related technologies has created tremendous possibilities for the interoperability between domains in distributed environments. Interoperab...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ISICT
2003
13 years 8 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
CCS
2008
ACM
13 years 8 months ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...
CSFW
2009
IEEE
14 years 1 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta