Modeling adversaries in a logic for security protocol analysis
JY Halpern, R Pucella - Logical Methods in Computer Science, 2012 - lmcs.episciences.org
Logics for security protocol analysis require the formalization of an adversary model that
specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which …
specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which …
云存储系统中数据完整性验证协议
曹夕, 许力, 陈兰香 - 计算机应用, 2012 - joca.cn
在云存储网络环境中, 数据的安全性和完整性是用户最关心的问题之一. 综合考虑云存储网络
环境中的安全需求, 设计了云存储数据完整性验证(CS-DIV) 协议. 客户端把数据文件和校验标签 …
环境中的安全需求, 设计了云存储数据完整性验证(CS-DIV) 协议. 客户端把数据文件和校验标签 …
Design and logical analysis on the access authentication scheme for satellite mobile communication networks
G Zheng, HT Ma, C Cheng, YC Tu - IET Information Security, 2012 - IET
It is important for security of satellite mobile communication networks to design an efficient
access authentication process. A two-way access authentication scheme among mobile …
access authentication process. A two-way access authentication scheme among mobile …
Foundations of logic-based trust management
Over the last 15 years, many policy languages have been developed for specifying policies
and credentials under the trust management paradigm. What has been missing is a formal …
and credentials under the trust management paradigm. What has been missing is a formal …
Using automated model analysis for reasoning about security of web protocols
A Kumar - Proceedings of the 28th Annual Computer Security …, 2012 - dl.acm.org
Interoperable identity and trust management infrastructure plays an important role in
enabling integrations in cloud computing environments. In the past decade or so, several …
enabling integrations in cloud computing environments. In the past decade or so, several …
SeVe: automatic tool for verification of security protocols
Security protocols play more and more important roles with wide use in many applications
nowadays. Currently, there are many tools for specifying and verifying security protocols …
nowadays. Currently, there are many tools for specifying and verifying security protocols …
Secure remote access to smart energy home area networks
B Vaidya, D Makrakis, H Mouftah - 2012 IEEE PES Innovative …, 2012 - ieeexplore.ieee.org
Smart Energy Home area Network (HAN) and Advanced Meter Infrastructure (AMI)
technologies have recently been the focus of rapid advancement and significant investment …
technologies have recently been the focus of rapid advancement and significant investment …
A belief logic for analyzing security of web protocols
A Kumar - Trust and Trustworthy Computing: 5th International …, 2012 - Springer
Many useful transactions on the web are implemented as a sequence of interactions that a
user performs with multiple collaborating providers. Safety of such transactions requires the …
user performs with multiple collaborating providers. Safety of such transactions requires the …
Analysis of mobile authentication protocols by SVO logic
A Almuhaideb, B Srinivasan, PD Le, C Wilson… - Proceedings of the First …, 2012 - dl.acm.org
The next generation of mobile services makes it desirable for mobile users to be connected
everywhere. Since these users usually in the move, roaming services are deployed to allow …
everywhere. Since these users usually in the move, roaming services are deployed to allow …
Introduction of cryptographic protocols
L Dong, K Chen, L Dong, K Chen - Cryptographic Protocol: Security …, 2012 - Springer
1 Introduction of Cryptographic Protocols Page 1 1 Introduction of Cryptographic Protocols
Abstract Cryptographic protocols are communication protocols which are designed to provide …
Abstract Cryptographic protocols are communication protocols which are designed to provide …