The IEEE 802.11 i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of …
Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …
C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis …
An apparatus and method for establishing a trusted path between a user interface and a trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …
We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the actions of a …
Modular composition of security mechanisms is complicated by the way that one mechanism may reveal information that interferes with the security of another. We develop methods for …
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof …
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventional …
JD Guttman, FJ Thayer, JA Carlson, JC Herzog… - European Symposium …, 2004 - Springer
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating …