×

Found 43 Documents (Results 1–43)

Alice and Bob: reconciling formal models and implementation. (English) Zbl 1434.68294

Bodei, Chiara (ed.) et al., Programming languages with applications to biology and security. Essays dedicated to Pierpaolo Degano on the occasion of his 65th birthday. Cham: Springer. Lect. Notes Comput. Sci. 9465, 66-85 (2015).
MSC:  68Q55 68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Alice and Bob meet equational theories. (English) Zbl 1321.68343

Martí-Oliet, Narciso (ed.) et al., Logic, rewriting, and concurrency. Essays dedicated to José Meseguer on the occasion of his 65th birthday. Cham: Springer (ISBN 978-3-319-23164-8/pbk; 978-3-319-23165-5/ebook). Lecture Notes in Computer Science 9200, 160-180 (2015).
MSC:  68Q60 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Provably repairing the ISO/IEC 9798 standard for entity authentication. (English) Zbl 1354.94055

Degano, Pierpaolo (ed.) et al., Principles of security and trust. First international conference, POST 2012, held as part of the European joint conferences on theory and practice of software, ETAPS 2012, Tallinn, Estonia, March 24 – April 1, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28640-7/pbk). Lecture Notes in Computer Science 7215, 129-148 (2012).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Application-binding protocol in the user centric smart card ownership model. (English) Zbl 1295.94005

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 208-225 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The open-source fixed-point model checker for symbolic analysis of security protocols. (English) Zbl 1252.68193

Aldini, Alessandro (ed.) et al., Foundations of security analysis and design V. FOSAD 2007/2008/2009 tutorial lectures. Berlin: Springer (ISBN 978-3-642-03828-0/pbk). Lecture Notes in Computer Science 5705, 166-194 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Comparing state spaces in automatic security protocol analysis. (English) Zbl 1242.94022

Cortier, Véronique (ed.) et al., Formal to practical security. Papers issued from the 2005–2008 French-Japanese collaboration. Berlin: Springer (ISBN 978-3-642-02001-8/pbk). Lecture Notes in Computer Science 5458, 70-94 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Cryptographic protocol composition via the authentication tests. (English) Zbl 1234.94045

de Alfaro, Luca (ed.), Foundations of software science and computational structures. 12th international conference, FOSSACS 2009, held as part of the joint European conferences on theory and practice of software, ETAPS 2009, York, UK, March 22–29, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00595-4/pbk). Lecture Notes in Computer Science 5504, 303-317 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Modeling and analysis of security protocols using role based specifications and Petri nets. (English) Zbl 1143.68476

van Hee, Kees M. (ed.) et al., Applications and theory of Petri nets. 29th international conference, PETRI NETS 2008, Xi’an, China, June 23–27, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68745-0/pbk). Lecture Notes in Computer Science 5062, 72-91 (2008).
MSC:  68Q85 68Q60 94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

Explicit randomness is not necessary when modeling probabilistic encryption. (English) Zbl 1277.94021

Dima, Cătălin (ed.) et al., Proceedings of the first workshop in information and computer security (ICS 2006), Timisoara, Romania, September 30, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 186, 49-65 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Integrating verification, testing, and learning for cryptographic protocols. (English) Zbl 1213.68387

Davies, Jim (ed.) et al., Integrated formal methods. 6th international conference, IFM 2007, Oxford, UK, July 2–5, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73209-9/pbk). Lecture Notes in Computer Science 4591, 538-557 (2007).
MSC:  68Q60 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

SAT-based verification of security protocols via translation to networks of automata. (English) Zbl 1196.68140

Edelkamp, Stefan (ed.) et al., Model checking and artificial intelligence. 4th workshop, MoChArt IV, Riva del Garda, Italy, August 29, 2006. Revised selected and invited papers. Berlin: Springer (ISBN 978-3-540-74127-5/pbk). Lecture Notes in Computer Science 4428. Lecture Notes in Artificial Intelligence, 146-165 (2007).
MSC:  68Q60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Searching for shapes in cryptographic protocols. (English) Zbl 1186.94435

Grumberg, Orna (ed.) et al., Tools and algorithms for the construction and analysis of systems. 13th international conference, TACAS 2007, held as part of the joint European conferences on theory and practice of software, ETAPS 2007, Braga, Portugal, March 24 – April 1, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71208-4/pbk). Lecture Notes in Computer Science 4424, 523-537 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. (English) Zbl 1180.68037

Aceto, Luca (ed.) et al., Foundations of software science and computation structures. 9th international conference, FOSSACS 2006, held as part of the joint European conferences on theory and practice of software, ETAPS 2006, Vienna, Austria, March 25–31, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33045-3/pbk). Lecture Notes in Computer Science 3921, 428-445 (2006).
MSC:  68M11 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic intruder deductions. (English) Zbl 1143.94339

Sutcliffe, Geoff (ed.) et al., Logic for programming, artificial intelligence, and reasoning. 12th international conference, LPAR 2005, Montego Bay, Jamaica, December 2–6, 2005. Proceedings. Berlin: Springer (ISBN 978-3-540-30553-8/pbk). Lecture Notes in Computer Science 3835, 549-564 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifying security protocols: An application of CSP. (English) Zbl 1081.68656

Abdallah, Ali E. (ed.) et al., Communicating sequential processes. The first 25 years. Symposium on the occasion of 25 years of CSP, London, UK, July 7–8, 2004. Revised invited papers. Berlin: Springer (ISBN 3-540-25813-2/pbk). Lecture Notes in Computer Science 3525, 243-263 (2005).
MSC:  68Q85 68T15 94A62
PDFBibTeX XMLCite
Full Text: DOI

The coinductive approach to verifying cryptographic protocols. (English) Zbl 1278.94052

Wirsing, Martin (ed.) et al., Recent trends in algebraic development techniques. 16th international workshop, WADT 2002, Frauenchiemsee, Germany, September 24–27, 2002. Revised selected papers. Berlin: Springer (ISBN 3-540-20537-3/pbk). Lect. Notes Comput. Sci. 2755, 268-283 (2003).
MSC:  94A60 68M12 68Q65
PDFBibTeX XMLCite
Full Text: DOI

A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. (English) Zbl 1205.94073

Pandya, Paritosh K. (ed.) et al., FST TCS 2003: Foundations of software technology and theoretical computer science. 23rd conference, Mumbai, India, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20680-9/pbk). Lect. Notes Comput. Sci. 2914, 1-12 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Process algebraic frameworks for the specification and analysis of cryptographic protocols. (English) Zbl 1124.94302

Rovan, Branislav (ed.) et al., Mathematical foundations of computer science 2003. 28th international symposium, MFCS 2003, Bratislava, Slovakia, August 25–29, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40671-9/pbk). Lect. Notes Comput. Sci. 2747, 46-67 (2003).
MSC:  94A60 68Q60 68Q85
PDFBibTeX XMLCite
Full Text: DOI

Data access specification and the most powerful symbolic attacker in MSR. (English) Zbl 1033.94514

Okada, Mitsuhiro (ed.) et al., Software security – theories and systems. Mext-NSF-JSPS international symposium, ISSS 2002, Tokyo, Japan, November 8–10, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00708-3/pbk). Lect. Notes Comput. Sci. 2609, 384-416 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Pattern-based abstraction for verifying secrecy in protocols. (English) Zbl 1031.94512

Garavel, Hubert (ed.) et al., Tools and algorithms for the construction and analysis of systems. 9th international conference TACAS 2003, held as part of the joint European conferences on theory and practice of software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2619, 299-314 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Proof theory, transformations, and logic programming for debugging security protocols. (English) Zbl 1073.68572

Pettorossi, Alberto (ed.), Logic based program synthesis and transformation. 11th international workshop, LOPSTR 2001, Paphos, Cyprus, November 28–30, 2001. Selected papers. Berlin: Springer (ISBN 3-540-43915-3). Lect. Notes Comput. Sci. 2372, 76-90 (2002).
PDFBibTeX XMLCite
Full Text: Link

Using SPIN to verify security properties of cryptographic protocols. (English) Zbl 1077.68696

Bošnački, Dragan (ed.) et al., Model checking software. 9th international SPIN workshop, Grenoble, France, April 11–13, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43477-1). Lect. Notes Comput. Sci. 2318, 187-204 (2002).
MSC:  68Q60 94A60
PDFBibTeX XMLCite
Full Text: Link

Key compromise, strand spaces, and the authentication tests. (English) Zbl 1260.94064

Brooks, Stephen (ed.) et al., MFPS 2001. Papers from the 17th conference on the mathematical foundations of programming semantics, Aarhus University, Aarhus, Denmark, May 23–26, 2001. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 45, 141-161 (2001).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Formal specification and verification of mobile agent data integrity properties: A case study. (English) Zbl 1052.68868

Picco, Gian Pietro (ed.), Mobile agents. 5th international conference, MA 2001, Atlanta, GA, USA, December 2–4, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42952-2). Lect. Notes Comput. Sci. 2240, 42-53 (2001).
PDFBibTeX XMLCite
Full Text: Link

CVS at work: A report on new failures upon some cryptographic protocols. (English) Zbl 0992.94505

Gorodetski, V. I. (ed.) et al., Information assurance in computer networks. Methods, models and architectures for network security. International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2052, 287-299 (2001).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Compiling and verifying security protocols. (English) Zbl 0988.68562

Parigot, Michel (ed.) et al., Logic for programming and automated reasoning. 7th international conference, LPAR 2000, Reunion Island, France, November 6-10, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1955, 131-160 (2000).
MSC:  68Q60 94A60 68Q42 68T15
PDFBibTeX XMLCite

Partial order reductions for security protocol verification. (English) Zbl 0965.68053

Graf, Susanne (ed.) et al., Tools and algorithms for the construction and analysis of systems. 6th international conference, TACAS 2000. Held as part of the joint European conferences on theory and practice of software, ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1785, 503-518 (2000).
MSC:  68Q60 68P25 94A62
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

Main Field

all top 3

Software