A formal notion of trust–enabling reasoning about security properties

A Fuchs, S Gürgens, C Rudolph - Trust Management IV: 4th IFIP WG 11.11 …, 2010 - Springer
Historically, various different notions of trust can be found, each addressing particular
aspects of ICT systems, eg trust in electronic commerce systems based on reputation and …

[HTML][HTML] An inter-domain authentication scheme for pervasive computing environment

L Yao, L Wang, X Kong, G Wu, F Xia - Computers & Mathematics with …, 2010 - Elsevier
In a pervasive computing environment, mobile users often roam into foreign domains.
Consequently, mutual authentication between the user and the service provider in different …

Looking at a class of RFID APs through GNY logic

X Zhang, Q Gao, MK Saad - International Journal of …, 2010 - inderscienceonline.com
Radio Frequency Identification Authentication Protocols (RFID APs) are an active research
topic and many protocols have been proposed. In this paper, we consider a class of recently …

Design and verification of a non-repudiation protocol based on receiver-side smart card

J Liu, L Vigneron - IET information security, 2010 - IET
All the existing non-repudiation protocols ensuring strong fairness have to assume that the
communication channel between trusted third party (TTP) and each player is resilient at …

Definition of entity authentication

N Ahmed, CD Jensen - 2010 2nd International Workshop on …, 2010 - ieeexplore.ieee.org
Authentication is considered a pre-requisite for communication security, but the definition of
authentication is generally not agreed upon. Many attacks on authentication protocols are …

Proof-based design of security protocols

N Benaissa, D Méry - International Computer Science Symposium in …, 2010 - Springer
We consider the refinement-based process for the development of security protocols. Our
approach is based on the Event B refinement, which makes proofs easier and which makes …

Strengthening and formally verifying privacy in identity management systems

S Suriadi - 2010 - eprints.qut.edu.au
In a digital world, users' Personally Identifiable Information (PII) is normally managed with a
system called an Identity Management System (IMS). There are many types of IMSs. There …

Modeling and verifying security protocols using PAT approach

LA Tuan - 2010 Fourth International Conference on Secure …, 2010 - ieeexplore.ieee.org
Security protocols play more and more important role nowadays, ranging from banking to
electronic commerce systems. They are designed to provide properties such as …

A timed logic for modeling and reasoning about security protocols

X Lei, R Xue, T Yu - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Many logical methods are usually considered suitable to express the static properties of
security protocols while unsuitable to model dynamic processes or properties. However, a …

[引用][C] 一种分析电子商务安全协议的新逻辑

陈莉 - 计算机科学, 2010