Verifying privacy-type properties in a modular way

M Arapinis, V Cheval, S Delaune - 2012 IEEE 25th Computer …, 2012 - ieeexplore.ieee.org
Formal methods have proved their usefulness for analysing the security of protocols. In this
setting, privacy-type security properties (eg vote-privacy, anonymity, unlink ability) that play …

Automatic verification of cryptographic protocols: privacy-type properties

V Cheval - 2012 - search.proquest.com
Plusieurs outils ont été développé pour vérifier automatiquement les propriétés de sécurité
sur des protocoles cryptographiques. Jusqu'à maintenant, la plupart de ces outils permettent …

Modular verification of protocol equivalence in the presence of randomness

MS Bauer, R Chadha, M Viswanathan - … 11-15, 2017, Proceedings, Part I …, 2017 - Springer
Security protocols that provide privacy and anonymity guarantees are growing increasingly
prevalent in the online world. The highly intricate nature of these protocols makes them …

Composing protocols with randomized actions

MS Bauer, R Chadha, M Viswanathan - … on Principles of Security and Trust, 2016 - Springer
Recently, several composition results have been established, showing that two
cryptographic protocols proven secure against a Dolev-Yao attacker continue to afford the …

Dynamic tags for security protocols

M Arapinis, S Delaune… - Logical Methods in …, 2014 - lmcs.episciences.org
The design and verification of cryptographic protocols is a notoriously difficult task, even in
symbolic models which take an abstract view of cryptography. This is mainly due to the fact …

Analysis of randomized security protocols

MS Bauer - 2018 - ideals.illinois.edu
Formal analysis has a long and successful track record in the automated verification of
security protocols. Techniques in this domain have converged around modeling protocols as …

Vérification formelle de protocoles basés sur de courtes chaines authentifiées

L Robin - 2018 - theses.hal.science
Les protocoles de sécurité modernes peuvent impliquer un participant humain de façon à ce
qu'il compare ou copie de courtes chaines de caractères faisant le pont entre différents …

[PDF][PDF] Laboratoire Spécification & Vérification

M Arapinis, V Cheval, S Delaune - 2012 - kar.kent.ac.uk
Formal methods have proved their usefulness for analysing the security of protocols. In such
a setting, privacy-type security properties (eg vote-privacy, anonymity, unlinkability) that play …