[BOOK][B] Modelling distributed systems

W Fokkink, JF Groote, M Reniers - 2007 - Springer
A distributed system is driven by separate components that are executed in parallel, and
protocols for such systems form a major aspect of system design in today's world of wireless …

FEIPS: A secure fair-exchange payment system for internet transactions

Z Djuric, D Gasevic - The Computer Journal, 2015 - academic.oup.com
To be considered secure, a payment system needs to address a number of security issues.
Besides fundamental security requirements, like confidentiality, data integrity, authentication …

Fairness analysis of extra-gain guilty of a non-repudiation protocol

X Guo - Frontiers of Information Technology & Electronic …, 2022 - Springer
Many traditional applications can be refined thanks to the development of blockchain
technology. One of these services is non-repudiation, in which participants in a …

Partial order reduction for branching security protocols

W Fokkink, MT Dashti, A Wijs - 2010 10th International …, 2010 - ieeexplore.ieee.org
Two extensions of the partial order reduction algorithm of Clarke, Jha and Marrero are
presented. The proposed algorithms are suitable for branching security protocols, eg …

Optimistic protocol for certified electronic mail with verifiable TTP

JL Ferrer-Gomila, MF Hinarejos, G Draper-Gil… - Computer Standards & …, 2018 - Elsevier
A large number of certified email proposals have been published over the last thirty years.
Many use a trusted third party (TTP) to guarantee the core security property: fairness; …

A certified email protocol using key chains

J Cederquist, MT Dashti, S Mauw - … International Conference on …, 2007 - ieeexplore.ieee.org
This paper introduces an asynchronous optimistic certified email protocol, with stateless
recipients, that relies on key chains to considerably reduce the storage requirements of the …

An intruder model for verifying liveness in security protocols

J Cederquist, MT Dashti - Proceedings of the fourth ACM workshop on …, 2006 - dl.acm.org
We present a process algebraic intruder model for verifying a class of liveness properties of
security protocols. For this class, the proposed intruder model is proved to be equivalent to a …

Optimistic non-repudiation protocol analysis

J Santiago, L Vigneron - … Workshop on Information Security Theory and …, 2007 - Springer
Non-repudiation protocols with session labels have a number of vulnerabilities. Recently
Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that …

Design and formal verification of a CEM protocol with transparent TTP

Z Liu, J Pang, C Zhang - Frontiers of Computer Science, 2013 - Springer
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important
security requirement which helps to avoid bad publicity as well as protecting individual …

Automatic methods for analyzing non-repudiation protocols with an active intruder

F Klay, L Vigneron - Formal Aspects in Security and Trust: 5th International …, 2009 - Springer
Non-repudiation protocols have an important role in many areas where secured transactions
with proofs of participation are necessary. Formal methods are clever and without error …