The scyther tool: Verification, falsification, and analysis of security protocols: Tool paper

CJF Cremers - International conference on computer aided verification, 2008 - Springer
With the rise of the Internet and other open networks, a large number of security protocols
have been developed and deployed in order to provide secure communication. The analysis …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Model checking security protocols

D Basin, C Cremers, C Meadows - Handbook of Model Checking, 2018 - Springer
The formal analysis of security protocols is a prime example of a domain where model
checking has been successfully applied. Although security protocols are typically small …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

Secure pseudonymous channels

S Mödersheim, L Viganò - … ESORICS 2009: 14th European Symposium on …, 2009 - Springer
Channels are an abstraction of the many concrete techniques to enforce particular
properties of message transmissions such as encryption. We consider here three basic …

The open-source fixed-point model checker for symbolic analysis of security protocols

S Mödersheim, L Vigano - International School on Foundations of Security …, 2007 - Springer
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security
protocol analysis, which extends the On-the-fly Model Checker (the previous OFMC). The …

Stateful protocol composition in Isabelle/HOL

AV Hess, SA Mödersheim, AD Brucker - ACM Transactions on Privacy …, 2023 - dl.acm.org
Communication networks like the Internet form a large distributed system where a huge
number of components run in parallel, such as security protocols and distributed web …

Multi-ciphersuite security of the Secure Shell (SSH) protocol

F Bergsma, B Dowling, F Kohlar, J Schwenk… - Proceedings of the …, 2014 - dl.acm.org
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers,
making it among the most important security protocols on the Internet. We show that the …

3D model-based hand tracking using stochastic direct search method

JY Lin, Y Wu, TS Huang - Sixth IEEE International Conference …, 2004 - ieeexplore.ieee.org
Tracking the articulated hand motion in a video sequence is a challenging problem in which
the main difficulty arises from the complexity of searching for an optimal motion estimate in a …

Typing and compositionality for security protocols: A generalization to the geometric fragment

O Almousa, S Mödersheim, P Modesti… - … Security--ESORICS 2015 …, 2015 - Springer
We integrate, and improve upon, prior relative soundness results of two kinds. The first kind
are typing results showing that any security protocol that fulfils a number of sufficient …