Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Measures and models of nicotine dependence: positive reinforcement

S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …

Automated security protocol analysis with the AVISPA tool

L Vigano - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security
Protocols and Applications. It provides a modular and expressive formal language for …

OFMC: A symbolic model checker for security protocols

D Basin, S Mödersheim, L Vigano - International Journal of Information …, 2005 - Springer
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing
security protocols based on lazy, demand-driven search. The first is the use of lazy data …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Modular verification of software components in C

S Chaki, EM Clarke, A Groce, S Jha… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
We present a new methodology for automatic verification of C programs against finite state
machine specifications. Our approach is compositional, naturally enabling us to decompose …

[图书][B] Software reliability methods

DA Peled - 2001 - books.google.com
Many books focus on increasing the quality of software through the use of formal methods.
However, most books embrace one particular method, and present it as the suggested …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

A classification of security properties for process algebras

R Focardi, R Gorrieri - Journal of Computer security, 1995 - content.iospress.com
Several information flow security definitions, proposed in the literature, are generalized and
adapted to the model of labelled transition systems. This very general model has been …