Modeling adversaries in a logic for security protocol analysis

JY Halpern, R Pucella - Logical Methods in Computer Science, 2012 - lmcs.episciences.org
Logics for security protocol analysis require the formalization of an adversary model that
specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which …

云存储系统中数据完整性验证协议

曹夕, 许力, 陈兰香 - 计算机应用, 2012 - joca.cn
在云存储网络环境中, 数据的安全性和完整性是用户最关心的问题之一. 综合考虑云存储网络
环境中的安全需求, 设计了云存储数据完整性验证(CS-DIV) 协议. 客户端把数据文件和校验标签 …

Design and logical analysis on the access authentication scheme for satellite mobile communication networks

G Zheng, HT Ma, C Cheng, YC Tu - IET Information Security, 2012 - IET
It is important for security of satellite mobile communication networks to design an efficient
access authentication process. A two-way access authentication scheme among mobile …

Foundations of logic-based trust management

MY Becker, A Russo, N Sultana - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Over the last 15 years, many policy languages have been developed for specifying policies
and credentials under the trust management paradigm. What has been missing is a formal …

Using automated model analysis for reasoning about security of web protocols

A Kumar - Proceedings of the 28th Annual Computer Security …, 2012 - dl.acm.org
Interoperable identity and trust management infrastructure plays an important role in
enabling integrations in cloud computing environments. In the past decade or so, several …

SeVe: automatic tool for verification of security protocols

AT Luu, J Sun, Y Liu, JS Dong, X Li… - Frontiers of Computer …, 2012 - Springer
Security protocols play more and more important roles with wide use in many applications
nowadays. Currently, there are many tools for specifying and verifying security protocols …

Secure remote access to smart energy home area networks

B Vaidya, D Makrakis, H Mouftah - 2012 IEEE PES Innovative …, 2012 - ieeexplore.ieee.org
Smart Energy Home area Network (HAN) and Advanced Meter Infrastructure (AMI)
technologies have recently been the focus of rapid advancement and significant investment …

A belief logic for analyzing security of web protocols

A Kumar - Trust and Trustworthy Computing: 5th International …, 2012 - Springer
Many useful transactions on the web are implemented as a sequence of interactions that a
user performs with multiple collaborating providers. Safety of such transactions requires the …

Analysis of mobile authentication protocols by SVO logic

A Almuhaideb, B Srinivasan, PD Le, C Wilson… - Proceedings of the First …, 2012 - dl.acm.org
The next generation of mobile services makes it desirable for mobile users to be connected
everywhere. Since these users usually in the move, roaming services are deployed to allow …

Introduction of cryptographic protocols

L Dong, K Chen, L Dong, K Chen - Cryptographic Protocol: Security …, 2012 - Springer
1 Introduction of Cryptographic Protocols Page 1 1 Introduction of Cryptographic Protocols
Abstract Cryptographic protocols are communication protocols which are designed to provide …