Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
The applied pi calculus: Mobile values, new names, and secure communication
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …
scoped names, with communication via messages on channels. This interaction is crucial in …
Automatic verification of correspondences for security protocols
B Blanchet - Journal of Computer Security, 2009 - content.iospress.com
We present a new technique for verifying correspondences in security protocols. In
particular, correspondences can be used to formalize authentication. Our technique is fully …
particular, correspondences can be used to formalize authentication. Our technique is fully …
Protocol composition logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …
protocols that use public and symmetric key cryptography. The logic is designed around a …
A modular correctness proof of IEEE 802.11 i and TLS
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …
network access point and user devices prior to user connectivity. The protocol consists of …
Models and proofs of protocol security: A progress report
Models and Proofs of Protocol Security: A Progress Report Page 1 Models and Proofs of
Protocol Security: A Progress Report Martın Abadi1,2, Bruno Blanchet3,4,5, and Hubert …
Protocol Security: A Progress Report Martın Abadi1,2, Bruno Blanchet3,4,5, and Hubert …
Methods and apparatuses for user-verifiable trusted path in the presence of malware
An apparatus and method for establishing a trusted path between a user interface and a
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …
A logic of secure systems and its application to trusted computing
We present a logic for reasoning about properties of secure systems. The logic is built
around a concurrent programming language with constructs for modeling machines with …
around a concurrent programming language with constructs for modeling machines with …
[BOOK][B] SOA—Standards & Technology
M Hafner, R Breu - 2009 - Springer
This chapter gives a brief overview of paradigms, technologies and standards that represent
the technical and conceptual foundation of the Sectet-framework. Section 2.1 introduces the …
the technical and conceptual foundation of the Sectet-framework. Section 2.1 introduces the …