The first edition of this book was published in 2003. Inevitably, certain parts of the book became outdated quickly. At the same time new developments have continued apace …
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the …
LC Paulson - Journal of computer security, 1998 - content.iospress.com
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with …
We study the interaction of the programming construct “new,” which generates statically scoped names, with communication via messages on channels. This interaction is crucial in …
Recent technologies have cleared the way for large scale application of electronic communication. The open and distributed nature of these communications implies that the …
Security protocols are one of the most critical elements in enabling the secure communication and processing of information, ensuring its confidentiality, integrity …
In this tutorial, we give an overview of the Maude-NRL Protocol Analyzer (Maude-NPA), a tool for the analysis of cryptographic protocols using functions that obey different equational …
V Cortier, B Smyth - Journal of Computer Security, 2013 - content.iospress.com
Abstract Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this article, we analyse ballot …
LC Paulson - ACM Transactions on Information and System Security …, 1999 - dl.acm.org
Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle …