Dolev-Yao model

Results: 12



#Item
1ARA SSIA FormaCryptTwo models for the verification of cryptographic protocols: computational model formal, “Dolev-Yao” model enc(M,k

ARA SSIA FormaCryptTwo models for the verification of cryptographic protocols: computational model formal, “Dolev-Yao” model enc(M,k

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:48
    2Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2012-10-11 06:26:07
    3ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

    ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

    Add to Reading List

    Source URL: www.irisa.fr

    Language: English - Date: 2003-12-17 02:53:50
    4Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu  Abstract

    Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2007-12-18 00:37:13
    5Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨

    Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨

    Add to Reading List

    Source URL: www.isse.uni-augsburg.de

    Language: English - Date: 2014-12-01 09:19:17
    6¨t Augsburg Universita Verifying Smart Card Applications: An ASM Approach. D.Haneberg, H.Grandy, W.Reif, G.Schellhorn

    ¨t Augsburg Universita Verifying Smart Card Applications: An ASM Approach. D.Haneberg, H.Grandy, W.Reif, G.Schellhorn

    Add to Reading List

    Source URL: www.isse.uni-augsburg.de

    Language: English - Date: 2014-12-01 09:19:28
    7NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specication in Formal Cryptographic Protocol Analysis Catherine Meadows

    NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

    Add to Reading List

    Source URL: www.nrl.navy.mil

    Language: English - Date: 2013-04-26 15:14:05
    8NRL Release Number[removed]Dolev-Yao is no better than Machiavelli Paul Syverson, Catherine Meadows  Center for High Assurance Computer Systems

    NRL Release Number[removed]Dolev-Yao is no better than Machiavelli Paul Syverson, Catherine Meadows Center for High Assurance Computer Systems

    Add to Reading List

    Source URL: www.nrl.navy.mil

    Language: English - Date: 2013-04-29 11:52:34
    9ZISC annual report[removed]

    ZISC annual report[removed]

    Add to Reading List

    Source URL: www.zisc.ethz.ch

    Language: English - Date: 2015-02-14 14:43:29
    10Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

    Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

    Add to Reading List

    Source URL: bib.irb.hr

    Language: English - Date: 2014-08-21 13:21:17