The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

OFMC: A symbolic model checker for security protocols

D Basin, S Mödersheim, L Vigano - International Journal of Information …, 2005 - Springer
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing
security protocols based on lazy, demand-driven search. The first is the use of lazy data …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Towards a formal foundation of web security

D Akhawe, A Barth, PE Lam, J Mitchell… - 2010 23rd IEEE …, 2010 - ieeexplore.ieee.org
We propose a formal model of web security based on an abstraction of the web platform and
use this model to analyze the security of several sample web mechanisms and applications …

Verifying privacy-type properties of electronic voting protocols

S Delaune, S Kremer, M Ryan - Journal of Computer Security, 2009 - content.iospress.com
Electronic voting promises the possibility of a convenient, efficient and secure facility for
recording and tallying votes in an election. Recently highlighted inadequacies of …

Accountability: definition and relationship to verifiability

R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …

An efficient strong designated verifier signature scheme

S Saeednia, S Kremer, O Markowitch - … 27-28, 2003. Revised Papers 6, 2004 - Springer
This paper proposes a designated verifier signature scheme based on the Schnorr signature
and the Zheng signcryption schemes. One of the advantages of the new scheme compared …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Formal methods for cryptographic protocol analysis: Emerging issues and trends

C Meadows - IEEE journal on selected areas in …, 2003 - ieeexplore.ieee.org
The history of the application of formal methods to cryptographic protocol analysis spans
over 20 years and has been showing signs of new maturity and consolidation. Not only have …