Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications

SB Far, AI Rad, SMH Bamakan, MR Asaar - Journal of Network and …, 2023 - Elsevier
The emergence of Metaverse, a digital environment built on Web 3.0 technologies, has
garnered significant attention from various industries and fields, including science and …

Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications

S Roy, AK Das, S Chatterjee, N Kumar… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Mobile cloud computing (MCC) allows mobile users to have on-demand access to cloud
services. A mobile cloud model helps in analyzing the information regarding the patients' …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Automated verification of selected equivalences for security protocols

B Blanchet, M Abadi, C Fournet - The Journal of Logic and Algebraic …, 2008 - Elsevier
In the analysis of security protocols, methods and tools for reasoning about protocol
behaviors have been quite effective. We aim to expand the scope of those methods and …

Automatic verification of correspondences for security protocols

B Blanchet - Journal of Computer Security, 2009 - content.iospress.com
We present a new technique for verifying correspondences in security protocols. In
particular, correspondences can be used to formalize authentication. Our technique is fully …

Refinement types for secure implementations

J Bengtson, K Bhargavan, C Fournet… - ACM Transactions on …, 2011 - dl.acm.org
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …

Automatic verification of security protocols in the symbolic model: The verifier proverif

B Blanchet - International School on Foundations of Security …, 2012 - Springer
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …

Verifiable agent interaction in abductive logic programming: the SCIFF framework

M Alberti, F Chesani, M Gavanelli, E Lamma… - ACM Transactions on …, 2008 - dl.acm.org
SCIFF is a framework thought to specify and verify interaction in open agent societies. The
SCIFF language is equipped with a semantics based on abductive logic programming; …