Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Protocol composition logic (PCL)

A Datta, A Derek, JC Mitchell, A Roy - Electronic Notes in Theoretical …, 2007 - Elsevier
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …

[图书][B] Computer Security and the Internet

PC van Oorschot - 2020 - Springer
Information Security–protecting information in potentially hostile environments–is a crucial
factor in the growth of information-based processes in industry, business, and …

A general composition theorem for secure reactive systems

M Backes, B Pfitzmann, M Waidner - Theory of Cryptography Conference, 2004 - Springer
We consider compositional properties of reactive systems that are secure in a cryptographic
sense. We follow the well-known simulatability approach of modern cryptography, ie, the …

A modular correctness proof of IEEE 802.11 i and TLS

C He, M Sundararajan, A Datta, A Derek… - Proceedings of the 12th …, 2005 - dl.acm.org
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …

A derivation system and compositional logic for security protocols

A Datta, A Derek, JC Mitchell… - Journal of Computer …, 2005 - content.iospress.com
Many authentication and key exchange protocols are built using an accepted set of standard
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …

Methods and apparatuses for user-verifiable trusted path in the presence of malware

JM McCune, AM Perrig, A Datta, VD Gligor… - US Patent …, 2014 - Google Patents
An apparatus and method for establishing a trusted path between a user interface and a
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …

Secure pseudonymous channels

S Mödersheim, L Viganò - … ESORICS 2009: 14th European Symposium on …, 2009 - Springer
Channels are an abstraction of the many concrete techniques to enforce particular
properties of message transmissions such as encryption. We consider here three basic …

The open-source fixed-point model checker for symbolic analysis of security protocols

S Mödersheim, L Vigano - International School on Foundations of Security …, 2007 - Springer
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security
protocol analysis, which extends the On-the-fly Model Checker (the previous OFMC). The …