Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
Multichannel Security Protocols
IEEE Pervasive Computing
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
Electronic Notes in Theoretical Computer Science (ENTCS)
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
The ASW Protocol Revisited: A Unified View
Electronic Notes in Theoretical Computer Science (ENTCS)
A Coordination-based Methodology for Security Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Completeness and Counter-Example Generations of a Basic Protocol Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
ACM Transactions on Internet Technology (TOIT)
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Security and Communication Networks
A security enhanced authentication and key distribution protocol for wireless networks
Security and Communication Networks
Verification of security protocols using LOTOS-method and application
Computer Communications
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Identity-Based key derivation method for low delay inter-domain handover re-authentication service
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Active attacking multicast key management protocol using alloy
ABZ'12 Proceedings of the Third international conference on Abstract State Machines, Alloy, B, VDM, and Z
Formal modelling and analysis of behaviour grading within a peer-to-peer storage system
Proceedings of the 2012 Symposium on Theory of Modeling and Simulation - DEVS Integrative M&S Symposium
LTL model-checking for security protocols
AI Communications
Some improvements to the cost-based framework for analyzing denial of service attacks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
LDYIS: a Framework for Model Checking Security Protocols
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
Fundamenta Informaticae - Fundamentals of Software Engineering 2007: Selected Contributions
Is cryptyc able to detect insider attacks?
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Risk balance in optimistic non-repudiation protocols
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Big brother knows your friends: on privacy of social communities in pervasive networks
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
A belief logic for analyzing security of web protocols
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Supporting Secure Coordination in SecSpaces
Fundamenta Informaticae
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Managing trust and secrecy in identity management clouds
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Proceedings of the 2012 ACM conference on Computer and communications security
A cross-protocol attack on the TLS protocol
Proceedings of the 2012 ACM conference on Computer and communications security
Computational soundness without protocol restrictions
Proceedings of the 2012 ACM conference on Computer and communications security
Computational verification of C protocol implementations by symbolic execution
Proceedings of the 2012 ACM conference on Computer and communications security
Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
Journal of Medical Systems
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Feeling is believing: a secure template exchange protocol
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Completeness of the authentication tests
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
OpenHSM: an open key life cycle protocol for public key infrastructure's hardware security modules
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
S-Narrowing for constructor systems
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
Model checking under fairness in proB and its application to fair exchange protocols
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
Quantitative security evaluation of a multi-biometric authentication system
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
A vulnerability in the UMTS and LTE authentication and key agreement protocols
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Towards the orchestration of secured services under non-disclosure policies
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Timed protocol insecurity problem is NP-complete
Future Generation Computer Systems
Future Generation Computer Systems
Reasoning about minimal anonymity in security protocols
Future Generation Computer Systems
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications
Security analysis of a secure and practical dynamic identity-based remote user authentication scheme
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Formal analysis of TESLA protocol in the timed OTS/CafeOBJ method
ISoLA'12 Proceedings of the 5th international conference on Leveraging Applications of Formal Methods, Verification and Validation: applications and case studies - Volume Part II
Using automated model analysis for reasoning about security of web protocols
Proceedings of the 28th Annual Computer Security Applications Conference
Am i in good company? a privacy-protecting protocol for cooperating ubiquitous computing devices
SP'12 Proceedings of the 20th international conference on Security Protocols
Access control in multi-party wireless sensor networks
EWSN'13 Proceedings of the 10th European conference on Wireless Sensor Networks
A robust and plaintext-aware variant of signed elgamal encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Sessions and separability in security protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
The secure platform problem taxonomy and analysis of existing proposals to address this problem
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance
Attack trace generation of cryptographic protocols based on coloured Petri nets model
International Journal of Wireless and Mobile Computing
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Towards modelling adaptive attacker's behaviour
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Security challenges for the intelligent transportation system
Proceedings of the First International Conference on Security of Internet of Things
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks
Wireless Personal Communications: An International Journal
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming
Proceedings of the 11th ACM international symposium on Mobility management and wireless access
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Fully automated analysis of padding-based encryption in the computational model
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Automatic verification of protocols with lists of unbounded length
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
Client-controlled cryptography-as-a-service in the cloud
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Experimental analysis of attacks on next generation air traffic communication
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
A new trusted roaming protocol in wireless mesh networks
International Journal of Sensor Networks
Truncating TLS connections to violate beliefs in web applications
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
SEC'13 Proceedings of the 22nd USENIX conference on Security
Language-based defenses against untrusted browser origins
SEC'13 Proceedings of the 22nd USENIX conference on Security
An access authentication protocol for trusted handoff in wireless mesh networks
Computer Standards & Interfaces
A formal methodology for integral security design and verification of network protocols
Journal of Systems and Software
Modeling test cases for security protocols with SecureMDD
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
Wireless Personal Communications: An International Journal
Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysing TLS in the strand spaces model
Journal of Computer Security
Fast automatic security protocol generation
Journal of Computer Security
LICS: Logic in Computer Security -- Some Attacker's Models and Related Decision Problems
LICS '13 Proceedings of the 2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Decision Support Systems
Verification of security protocols with lists: From length one to unbounded length
Journal of Computer Security - Security and Trust Principles
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 754.84 |
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characterizations that can be used to determine protocol security in these models are given.