Communicating sequential processes
Communicating sequential processes
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Design and validation of computer protocols
Design and validation of computer protocols
Symbolic model checking: an approach to the state explosion problem
Symbolic model checking: an approach to the state explosion problem
Model checking software systems: a case study
SIGSOFT '95 Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Using encryption for authentication in large networks of computers
Communications of the ACM
Protocol Verification as a Hardware Design Aid
ICCD '92 Proceedings of the 1991 IEEE International Conference on Computer Design on VLSI in Computer & Processors
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
UEPS - A Second Generation Electronic Wallet
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Reasoning about accountability in protocols for electronic commerce
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
CSP and determinism in security modelling
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Token and notational money in electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Atomicity in electronic commerce
netWorker
Personal security agent: KQML-based PKI
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Efficiency of data structures for detecting overlaps in digital documents
ACSC '01 Proceedings of the 24th Australasian conference on Computer science
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Verification of Payment Protocols via MultiAgent Model Checking
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Lazy Infinite-State Analysis of Security Protocols
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
K-gram based software birthmarks
Proceedings of the 2005 ACM symposium on Applied computing
The application of model checking for securing e-commerce transactions
Communications of the ACM - Hacking and innovation
Managing déjà vu: Collection building for the identification of nonidentical duplicate documents
Journal of the American Society for Information Science and Technology - Research Articles
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Model checking for design and assurance of e-business processes
Decision Support Systems
Trusting trusted hardware: towards a formal model for programmable secure coprocessors
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
Information and Software Technology
The design of a similarity based deduplication system
SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference
Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Finite-state verification of the ebXML protocol
Electronic Commerce Research and Applications
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Analyzing security protocols using association rule mining
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Model-Based analysis of money accountability in electronic purses
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Detecting collusion attacks in security protocols
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Symbolic model checking composite Web services using operational and control behaviors
Expert Systems with Applications: An International Journal
Fairness analysis of e-commerce protocols based on strand spaces
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
The paper develops model checking techniques to examine NetBill and Digicash. We show how model checking can verify atomicity properties by analyzing simplified versions of these protocols that retain crucial security constraints. For our analysis we used the FDR model checker.