Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
[BOK][B] Security properties
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Menu Find a journal Publish with us Track your research Search Cart Book cover …
[BOK][B] Formal correctness of security protocols
G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …
participants are required to observe predefined steps called security protocols, whose proof …
Effect of Liquid Phase Sintering on Microstructure and Mechanical Properties of Yb2O3‐AlN Containing SiC‐Based Ceramics
VA Izhevskyi, AHA Bressiani… - Journal of the American …, 2005 - Wiley Online Library
A series of silicon carbide‐based ceramics with different sintering additives were liquid‐
phase sintered to high densities. Yb2O3 in combination with AlN was used as the additive …
phase sintered to high densities. Yb2O3 in combination with AlN was used as the additive …
Accountability protocols: Formalized and verified
Classical security protocols aim to achieve authentication and confidentiality under the
assumption that the peers behave honestly. Some recent protocols are required to achieve …
assumption that the peers behave honestly. Some recent protocols are required to achieve …
Security analysis of (un-) fair non-repudiation protocols
S Gürgens, C Rudolph - Formal aspects of security, 2002 - Springer
An approach to protocol analysis using asynchronous product automata (APA) and the
simple homomorphism verification tool (SHVT) is demonstrated on several variants of the …
simple homomorphism verification tool (SHVT) is demonstrated on several variants of the …
[PDF][PDF] Formal analysis of optimistic fair exchange protocols
S Kremer - Universit'e Libre de Bruxelles Facult'e des Sciences, 2003 - Citeseer
Security of information has become of increasing importance in today's information society.
Sensitive information such as credit card numbers is sent over the Internet every day …
Sensitive information such as credit card numbers is sent over the Internet every day …
Using Coq to Verify Java CardTM Applet Isolation Properties
This paper reports on the use of the Coq proof assistant for the formal verification of applet
isolation properties in Java Card technology. We focus on the confidentiality property. We …
isolation properties in Java Card technology. We focus on the confidentiality property. We …
Verifying second-level security protocols
A second-level security protocol is defined as a security protocol that relies on an underlying
security protocol in order to achieve its goals. The verification of classical authentication …
security protocol in order to achieve its goals. The verification of classical authentication …
On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
We design and analyze a simple optimistic fair non-repudia-tion protocol. Our protocol is
considerably simpler and more efficient than current proposals, due mainly to the avoidance …
considerably simpler and more efficient than current proposals, due mainly to the avoidance …