The IEEE 802.11 i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of …
S Chaki, A Datta - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
We present ASPIER-the first framework that combines software model checking with a standard protocol security model to automatically analyze authentication and secrecy …
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental …
We report on the detailed verification of a substantial portion of the Kerberos 5 protocol specification. Because it targeted a deployed protocol rather than an academic abstraction …
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their …
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various …
D Pavlovic, C Meadows - … –ESORICS 2006: 11th European Symposium on …, 2006 - Springer
Secrecy and authenticity properties of protocols are mutually dependent: every authentication is based on some secrets, and every secret must be authenticated. This …
D Pavlovic, C Meadows - International Conference on Distributed …, 2012 - Springer
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we …