Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[BOK][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

[BOK][B] Formal correctness of security protocols

G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …

Effect of Liquid Phase Sintering on Microstructure and Mechanical Properties of Yb2O3‐AlN Containing SiC‐Based Ceramics

VA Izhevskyi, AHA Bressiani… - Journal of the American …, 2005 - Wiley Online Library
A series of silicon carbide‐based ceramics with different sintering additives were liquid‐
phase sintered to high densities. Yb2O3 in combination with AlN was used as the additive …

Accountability protocols: Formalized and verified

G Bella, LC Paulson - ACM Transactions on Information and System …, 2006 - dl.acm.org
Classical security protocols aim to achieve authentication and confidentiality under the
assumption that the peers behave honestly. Some recent protocols are required to achieve …

Security analysis of (un-) fair non-repudiation protocols

S Gürgens, C Rudolph - Formal aspects of security, 2002 - Springer
An approach to protocol analysis using asynchronous product automata (APA) and the
simple homomorphism verification tool (SHVT) is demonstrated on several variants of the …

[PDF][PDF] Formal analysis of optimistic fair exchange protocols

S Kremer - Universit'e Libre de Bruxelles Facult'e des Sciences, 2003 - Citeseer
Security of information has become of increasing importance in today's information society.
Sensitive information such as credit card numbers is sent over the Internet every day …

Using Coq to Verify Java CardTM Applet Isolation Properties

J Andronick, B Chetali, O Ly - Theorem Proving in Higher Order Logics …, 2003 - Springer
This paper reports on the use of the Coq proof assistant for the formal verification of applet
isolation properties in Java Card technology. We focus on the confidentiality property. We …

Verifying second-level security protocols

G Bella, C Longo, LC Paulson - … on Theorem Proving in Higher Order …, 2003 - Springer
A second-level security protocol is defined as a security protocol that relies on an underlying
security protocol in order to achieve its goals. The verification of classical authentication …

On the quest for impartiality: Design and analysis of a fair non-repudiation protocol

J Cederquist, R Corin, MT Dashti - … 2005, Bei**g, China, December 10-13 …, 2005 - Springer
We design and analyze a simple optimistic fair non-repudia-tion protocol. Our protocol is
considerably simpler and more efficient than current proposals, due mainly to the avoidance …