Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[KNIHA][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

An overview of the verification of SET

G Bella, F Massacci, LC Paulson - International Journal of Information …, 2005 - Springer
This paper describes the verification of Secure Electronic Transaction (SET), an e-commerce
protocol by VISA and MasterCard. The main tasks are to comprehend the written …

The symmetric group defies strong Fourier sampling

C Moore, A Russell, LJ Schulman - SIAM Journal on Computing, 2008 - SIAM
The dramatic exponential speedups of quantum algorithms over their best existing classical
counterparts were ushered in by the technique of Fourier sampling, introduced by Bernstein …

[KNIHA][B] Formal correctness of security protocols

G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …

Verifying the SET purchase protocols

G Bella, F Massacci, LC Paulson - Journal of Automated Reasoning, 2006 - Springer
Abstract SET (Secure Electronic Transaction) is a suite of protocols proposed by a
consortium of credit card companies and software corporations to secure e-commerce …

The verification of an industrial payment protocol: The SET purchase phase

G Bella, LC Paulson, F Massacci - … of the 9th ACM Conference on …, 2002 - dl.acm.org
The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of
credit card companies and software corporations to secure e-commerce transactions. When …

Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard

P Giorgini, F Massacci, J Mylopoulos - International Conference on …, 2003 - Springer
Computer Security is one of today's hot topic and the need for conceptual models of security
features have brought up a number of proposals ranging from UML extensions to novel …

[KNIHA][B] Modern cryptography primer

C Kościelny, M Kurkowski, M Srebrny - 2013 - Springer
For centuries, the need to ensure confidentiality of some gathered or transmitted information
got a lot of attention in various political or military contexts. Nowadays, in the era of a general …

Using static analysis to validate the SAML single sign-on protocol

SM Hansen, J Skriver, HR Nielson - … of the 2005 Workshop on Issues in …, 2005 - dl.acm.org
Previous studies have successfully used static analysis to automatically validate
authentication and confidentiality properties of classical key distribution protocols. In this …