[BOOK][B] Modelling distributed systems
A distributed system is driven by separate components that are executed in parallel, and
protocols for such systems form a major aspect of system design in today's world of wireless …
protocols for such systems form a major aspect of system design in today's world of wireless …
FEIPS: A secure fair-exchange payment system for internet transactions
To be considered secure, a payment system needs to address a number of security issues.
Besides fundamental security requirements, like confidentiality, data integrity, authentication …
Besides fundamental security requirements, like confidentiality, data integrity, authentication …
Fairness analysis of extra-gain guilty of a non-repudiation protocol
X Guo - Frontiers of Information Technology & Electronic …, 2022 - Springer
Many traditional applications can be refined thanks to the development of blockchain
technology. One of these services is non-repudiation, in which participants in a …
technology. One of these services is non-repudiation, in which participants in a …
Partial order reduction for branching security protocols
Two extensions of the partial order reduction algorithm of Clarke, Jha and Marrero are
presented. The proposed algorithms are suitable for branching security protocols, eg …
presented. The proposed algorithms are suitable for branching security protocols, eg …
Optimistic protocol for certified electronic mail with verifiable TTP
A large number of certified email proposals have been published over the last thirty years.
Many use a trusted third party (TTP) to guarantee the core security property: fairness; …
Many use a trusted third party (TTP) to guarantee the core security property: fairness; …
A certified email protocol using key chains
This paper introduces an asynchronous optimistic certified email protocol, with stateless
recipients, that relies on key chains to considerably reduce the storage requirements of the …
recipients, that relies on key chains to considerably reduce the storage requirements of the …
An intruder model for verifying liveness in security protocols
J Cederquist, MT Dashti - Proceedings of the fourth ACM workshop on …, 2006 - dl.acm.org
We present a process algebraic intruder model for verifying a class of liveness properties of
security protocols. For this class, the proposed intruder model is proved to be equivalent to a …
security protocols. For this class, the proposed intruder model is proved to be equivalent to a …
Optimistic non-repudiation protocol analysis
J Santiago, L Vigneron - … Workshop on Information Security Theory and …, 2007 - Springer
Non-repudiation protocols with session labels have a number of vulnerabilities. Recently
Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that …
Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that …
Design and formal verification of a CEM protocol with transparent TTP
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important
security requirement which helps to avoid bad publicity as well as protecting individual …
security requirement which helps to avoid bad publicity as well as protecting individual …
Automatic methods for analyzing non-repudiation protocols with an active intruder
F Klay, L Vigneron - Formal Aspects in Security and Trust: 5th International …, 2009 - Springer
Non-repudiation protocols have an important role in many areas where secured transactions
with proofs of participation are necessary. Formal methods are clever and without error …
with proofs of participation are necessary. Formal methods are clever and without error …