Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart Book cover …
The formal analysis of security protocols is a prime example of a domain where model checking has been successfully applied. Although security protocols are typically small …
With the increasing number of emerging robust networks, the challenges to design new security protocols and techniques are never ending. With the enlargement of 5G paradigm …
S Mödersheim, L Viganò - … ESORICS 2009: 14th European Symposium on …, 2009 - Springer
Channels are an abstraction of the many concrete techniques to enforce particular properties of message transmissions such as encryption. We consider here three basic …
S Mödersheim, L Vigano - International School on Foundations of Security …, 2007 - Springer
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the On-the-fly Model Checker (the previous OFMC). The …
Communication networks like the Internet form a large distributed system where a huge number of components run in parallel, such as security protocols and distributed web …
F Bergsma, B Dowling, F Kohlar, J Schwenk… - Proceedings of the …, 2014 - dl.acm.org
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the …
JY Lin, Y Wu, TS Huang - Sixth IEEE International Conference …, 2004 - ieeexplore.ieee.org
Tracking the articulated hand motion in a video sequence is a challenging problem in which the main difficulty arises from the complexity of searching for an optimal motion estimate in a …
We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient …