A formal notion of trust–enabling reasoning about security properties
A Fuchs, S Gürgens, C Rudolph - Trust Management IV: 4th IFIP WG 11.11 …, 2010 - Springer
Historically, various different notions of trust can be found, each addressing particular
aspects of ICT systems, eg trust in electronic commerce systems based on reputation and …
aspects of ICT systems, eg trust in electronic commerce systems based on reputation and …
[HTML][HTML] An inter-domain authentication scheme for pervasive computing environment
In a pervasive computing environment, mobile users often roam into foreign domains.
Consequently, mutual authentication between the user and the service provider in different …
Consequently, mutual authentication between the user and the service provider in different …
Looking at a class of RFID APs through GNY logic
X Zhang, Q Gao, MK Saad - International Journal of …, 2010 - inderscienceonline.com
Radio Frequency Identification Authentication Protocols (RFID APs) are an active research
topic and many protocols have been proposed. In this paper, we consider a class of recently …
topic and many protocols have been proposed. In this paper, we consider a class of recently …
Design and verification of a non-repudiation protocol based on receiver-side smart card
J Liu, L Vigneron - IET information security, 2010 - IET
All the existing non-repudiation protocols ensuring strong fairness have to assume that the
communication channel between trusted third party (TTP) and each player is resilient at …
communication channel between trusted third party (TTP) and each player is resilient at …
Definition of entity authentication
Authentication is considered a pre-requisite for communication security, but the definition of
authentication is generally not agreed upon. Many attacks on authentication protocols are …
authentication is generally not agreed upon. Many attacks on authentication protocols are …
Proof-based design of security protocols
N Benaissa, D Méry - International Computer Science Symposium in …, 2010 - Springer
We consider the refinement-based process for the development of security protocols. Our
approach is based on the Event B refinement, which makes proofs easier and which makes …
approach is based on the Event B refinement, which makes proofs easier and which makes …
Strengthening and formally verifying privacy in identity management systems
S Suriadi - 2010 - eprints.qut.edu.au
In a digital world, users' Personally Identifiable Information (PII) is normally managed with a
system called an Identity Management System (IMS). There are many types of IMSs. There …
system called an Identity Management System (IMS). There are many types of IMSs. There …
Modeling and verifying security protocols using PAT approach
LA Tuan - 2010 Fourth International Conference on Secure …, 2010 - ieeexplore.ieee.org
Security protocols play more and more important role nowadays, ranging from banking to
electronic commerce systems. They are designed to provide properties such as …
electronic commerce systems. They are designed to provide properties such as …
A timed logic for modeling and reasoning about security protocols
X Lei, R Xue, T Yu - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Many logical methods are usually considered suitable to express the static properties of
security protocols while unsuitable to model dynamic processes or properties. However, a …
security protocols while unsuitable to model dynamic processes or properties. However, a …