Sciweavers

POST
2012
181views more  POST 2012»
12 years 7 months ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
CADE
2011
Springer
12 years 11 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 3 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 6 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
IFIP
2009
Springer
13 years 9 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
CCS
2010
ACM
13 years 9 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
JCM
2007
80views more  JCM 2007»
13 years 11 months ago
On the Impact of Security on the Performance of WLANs
— This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used ...
Ezedin Barka, Mohammed Boulmalf
FUIN
2007
104views more  FUIN 2007»
13 years 11 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
ENTCS
2007
87views more  ENTCS 2007»
13 years 11 months ago
Temporal Logics of Knowledge and their Applications in Security
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an agent or component is important, and where change in this knowledge may occur over...
Clare Dixon, M. Carmen Fernández Gago, Mich...
JSW
2008
110views more  JSW 2008»
13 years 11 months ago
An Open Approach for the Applied Pi Calculus
A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends -calculus in order to facilitate analyzing security protocols. Our notion is based on the label...
Han Zhu, Yonggen Gu, Xiaohong Wu