- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0001000001000000
- More
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
(Akmal) Ridhwan Omar Ali, Amal (1)
-
AA Baranger, David (1)
-
Adie, Prestone (1)
-
Adriaan Edelsbrunner, Peter (1)
-
Alaburda, Paulius (1)
-
Albers, Casper (1)
-
Alspaugh, Sara (1)
-
Alstott, Jeff (1)
-
Althoff, Tim (1)
-
Amireh, Hashem (1)
-
Amy Sommer, S. (1)
-
Ariño de la Rubia, Eduardo (1)
-
Arthur Nelson, Andrew (1)
-
Arzi, Adbi (1)
-
Bahník, Štěpán (1)
-
Baik, Jason (1)
-
Banker, Sachin (1)
-
Barr, Dale J. (1)
-
Barros-Rivera, Brenda (1)
-
Bauer, Matt (1)
-
- Filter by Editor
-
-
null (2)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
null (Ed.)Automated reasoning tools for security protocols model protocols as non-deterministic processes that communicate through a Dolev-Yao attacker. There are, however, a large class of protocols whose correctness relies on an explicit ability to model and reason about randomness. Although such protocols lie at the heart of many widely adopted systems for anonymous communication, they have so-far eluded automated verification techniques. We propose an algorithm for reasoning about safety properties for randomized protocols. The algorithm is implemented as an extension of Stochastic Protocol ANalyzer (Span), the mechanized tool that reasons about the indistinguishability properties of randomized protocols. Using Span, we conduct the first automated verification on several randomized security protocols and uncover previously unknown design weaknesses in several of the protocols we analyzed.more » « less
-
Schweinsberg, Martin; Feldman, Michael; Staub, Nicola; van den Akker, Olmo R.; van Aert, Robbie C.M.; van Assen, Marcel A.L.M.; Liu, Yang; Althoff, Tim; Heer, Jeffrey; Kale, Alex; et al (, Organizational Behavior and Human Decision Processes)null (Ed.)
An official website of the United States government
