Formal methods for cryptographic protocol analysis: Emerging issues and trends

C Meadows - IEEE journal on selected areas in …, 2003 - ieeexplore.ieee.org
The history of the application of formal methods to cryptographic protocol analysis spans
over 20 years and has been showing signs of new maturity and consolidation. Not only have …

Multiset rewriting and the complexity of bounded security protocols

N Durgin, P Lincoln, J Mitchell… - Journal of Computer …, 2004 - journals.sagepub.com
We formalize the Dolev–Yao model of security protocols, using a notation based on multiset
rewriting with existentials. The goals are to provide a simple formal notation for describing …

Dynamic spectrum sharing in a blockchain enabled network with multiple cell-free massive MIMO virtual operators

G Femenias, MF Hinarejos, F Riera-Palou… - IEEE …, 2024 - ieeexplore.ieee.org
This paper introduces a novel dynamic spectrum sharing (DSS) scheme designed for cell-
free massive MIMO (CF-mMIMO) networks. The motivation behind this work arises from the …

Fair exchange

H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …

Security protocol design via authentication tests

JD Guttman - Proceedings 15th IEEE Computer Security …, 2002 - ieeexplore.ieee.org
We describe a protocol design process, and illustrate its use by creating ATSPECT, an
authentication test-based secure protocol for electronic commerce transactions. The design …

Formal analysis of multiparty contract signing

R Chadha, S Kremer, A Scedrov - Journal of Automated Reasoning, 2006 - Springer
We analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of
Baum and Waidner (BW). We use a finite-state tool, M ocha, which allows specification of …

Game analysis of abuse-free contract signing

S Kremer, JF Raskin - Proceedings 15th IEEE Computer …, 2002 - ieeexplore.ieee.org
In this paper we report on the verification of two contract signing protocols. Our verification
method is based on the idea of modeling those protocols as games, and reasoning about …

Analysis of probabilistic contract signing

G Norman, V Shmatikov - Journal of Computer Security, 2006 - content.iospress.com
We present three case studies, investigating the use of probabilistic model checking to
automatically analyse properties of probabilistic contract signing protocols. We use the …

Abuse-freeness in contract signing: a blockchain-based proposal

JL Ferrer-Gomila, MF Hinarejos - International Journal of Information …, 2024 - Springer
Electronic contract signing requires the design of protocols that guarantee that the exchange
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …

Compositional analysis of contract-signing protocols

M Backes, A Datta, A Derek, JC Mitchell… - Theoretical Computer …, 2006 - Elsevier
We develop a general method for proving properties of contract-signing protocols using a
specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …