ACM Transactions on Computer Systems (TOCS)
Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Arbitration (or How to Merge Knowledge Bases)
IEEE Transactions on Knowledge and Data Engineering
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Practical Asymmetric Fingerprinting with a TTP
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Identifying dependency between secure messages for protocol analysis
KSEM'07 Proceedings of the 2nd international conference on Knowledge science, engineering and management
Association rule mining: models and algorithms
Association rule mining: models and algorithms
Analyzing security protocols using association rule mining
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Detecting collusion attacks in security protocols
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Formal methods for cryptographic protocol analysis: emerging issues and trends
IEEE Journal on Selected Areas in Communications
Alignment-based surface patterns for factoid question answering systems
Integrated Computer-Aided Engineering - Selected papers from the IEEE Conference on Information Reuse and Integration (IRI), July 13-15, 2008
A supervised learning approach to biological question answering
Integrated Computer-Aided Engineering - Selected papers from the IEEE Conference on Information Reuse and Integration (IRI), July 13-15, 2008
Using conditional random fields for result identification in biomedical abstracts
Integrated Computer-Aided Engineering
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and impersonation, the arisen inconsistent data between principals and collusion attacks held by a group of dishonest principals have been largely ignored. Moreover, the previous methods focus on reasoning about certain security-related properties and detecting known attacks against secure message, whereas there have been insufficient efforts to handle the above hidden but powerful attacks. In this paper, we address these critical issues and prove the efficiency and intuitiveness of rule-based dependency models in defending a protocol against the attacks. This is able to provide a numerical estimation to measure he occurrence of these attacks. It will be useful in enhancing the current protocol analysis.