947 Hits in 6.4 sec

On-the-Fly Model Checking of Fair Non-repudiation Protocols [chapter]

Guoqiang Li, Mizuhito Ogawa
Automated Technology for Verification and Analysis  
This paper extends the model in our previous work [1], and gives a sound and complete on-the-fly model checking method for fair non-repudiation protocols under the assumption of the bounded number of sessions  ...  We also implement the method using Maude. Our experiments automatically detect flaws of several fair non-repudiation protocols.  ...  This research is supported by the 21st Century COE "Verifiable and Evolvable e-Society" of JAIST, funded by Japanese Ministry of Education, Culture, Sports, Science and Technology.  ... 
doi:10.1007/978-3-540-75596-8_36 dblp:conf/atva/LiO07 fatcat:7kg5zpcjwfdvfp636m235glqkq

Multiparty nonrepudiation

Jose A. Onieva, Jianying Zhou, Javier Lopez
2008 ACM Computing Surveys  
It starts with a brief introduction of fundamental issues on non-repudiation, including the types of nonrepudiation service and cryptographic evidence, the roles of trusted third party, non-repudiation  ...  Actually, it represents the core of a non-repudiation protocol. It is greatly influenced by the communication channel properties.  ...  It can be very useful during the initial setup of a non-repudiation infrastructure as well as in those scenarios in which the TTP has to be selected by the entities on the fly (e.g. in an ad-hoc network  ... 
doi:10.1145/1456650.1456655 fatcat:ygzho6mlevdjpagztwgvezv5r4

Formal Validation of OFEPSP+ with AVISPA [chapter]

Jorge L. Hernandez-Ardieta, Ana I. Gonzalez-Tablas, Benjamin Ramos
2009 Lecture Notes in Computer Science  
In particular, the results obtained from the formal validation of the improved Optimistic Fair Exchange Protocol based on Signature Policies (OFEPSP+) are presented.  ...  OFEPSP+ ensures that no party gains an unfair advantage over the other during the protocol execution, while substantially reducing the probability of a successful attack on the protocol due to a compromise  ...  This research has been partially supported by the Ministry of Industry, Tourism and Trade of Spain, in the framework of the project CENIT-Segur@, reference CENIT-2007 2004.  ... 
doi:10.1007/978-3-642-03459-6_9 fatcat:tw6sdm6opnclzpubqftxiyqply

An Optimistic Fair Exchange E-commerce Protocol for Complex Transactions

Cătălin V. Bîrjovanu, Mirela Bîrjovanu
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
Also, our protocol provides effectiveness, timeliness, non-repudiation, integrity and confidentiality of data exchanged between the parties.  ...  Our protocol uses as building block the fair exchange internet payment protocol (FEIPS) for physical products that considers only one customer and one merchant.  ...  constraint solving techniques (Turuani, 2006) , and OFMC (On-the-Fly Model-Checker) -a model checker that uses symbolic techniques (Basin et al., 2005) .  ... 
doi:10.5220/0006853502770288 dblp:conf/icete/BirjoveanuB18a fatcat:v3o2334nuzbqdmf6xaaic4gmmi

D2.4 - Transparency and Compliance Algorithms V1

Sabrina Kirrane, Piero Bonatti, Javier D. Fernández, Clemente Galdi, Luigi Sauro
2018 Zenodo  
and aggregated data based on the user context, on top of the designed transparency framework (T2.3).  ...  Development of transparency and compliance algorithms (T2.4) to assure that any data processing is inline with the policies and the legislation (T2.1, T2.2), and to provide synthesis of policies for mined  ...  Leipzig, DE. for their contribution to Chapter 3 Leveraging the Big Data Europe Infrastructure.  ... 
doi:10.5281/zenodo.2549586 fatcat:uacsjwmyy5abdczqkvmbp6bn6u

The ASW Protocol Revisited: A Unified View

Paul Hankes Drielsma, Sebastian Mödersheim
2005 Electronical Notes in Theoretical Computer Science  
This line of reasoning yields a simpler and clearer model of agents and protocol objectives which is within the scope of standard security analysis methods, as it does not require fairness constraints  ...  We revisit the analysis of the ASW contract signing protocol and use a unified view of the protocol as a whole as a basis to reason about the protocol and its objectives.  ...  The first tool is the On-the-Fly Model-Checker (OFMC) which is based on a symbolic representation of the intruder, called the lazy intruder [4] .  ... 
doi:10.1016/j.entcs.2004.05.024 fatcat:ptrhiayrsbbxrjhnqoujfxzuie

Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol

Chalee Thammarat
2020 Symmetry  
The standard protocol of near field communication (NFC) has concentrated primarily on the speed of communication while ignoring security properties.  ...  The proposed protocol checks robustness and soundness using Burrows, Abadi and Needham (BAN) logic, the Scyther tool, and automated validation of internet security protocols and applications (AVISPA) that  ...  We simulate and check the proposed protocol under both, on-the-fly model-checker (OFMC) and constraint logic-based attack searcher (CL-ATSE) back-ends.  ... 
doi:10.3390/sym12101649 fatcat:3zgu3wz3unfvzamrsrxh7dnyzi

Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees [chapter]

Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
2007 Lecture Notes in Computer Science  
In our model checking approach, protocol correctness is checked by appropriate user-supplied assertions or reachability of invalid end states.  ...  The described intruder was implemented within the SPIN model-checker and revealed an integrity violation attack on the PayWord micro payment protocol.  ...  Introduction Model-checking of cryptographic protocols takes place on a model of a small system running the protocol of interest together with an intruder model that interacts with the protocol.  ... 
doi:10.1007/978-3-540-75101-4_22 fatcat:na45z2pwazcghefu2rhzk2wmai

D2.8 Transparency and Compliance Algorithms V2

Sabrina Kirrane, Piero Bonatti, Javier D. Fernández, Clemente Galdi, Luigi Sauro, Daniele Dell'Erba, Iliana Petrova, Ida Siahaan
2018 Zenodo  
term of non-repudiation that could be provided by existing fair exchange protocols in Chapter 4.  ...  The aim of this deliverable is to dig deeper into open technical and research challenges in terms of personal data processing and sharing transparency, and compliance checking.  ...  Leipzig, DE. for their contribution to Chapter 3 Leveraging the Big Data Europe Infrastructure.  ... 
doi:10.5281/zenodo.4585644 fatcat:xrllgyqfgrdwdcg25dsnfr254u

A Constructive DIREST Security Threat Modeling for Drone as a Service

Fahad Salamh, Umit Karabiyik, Marcus Rogers
2021 Journal of Digital Forensics, Security and Law  
Our results show that the proposed threat model enhances the security of flying devices and provides consistency in digital forensic procedures.  ...  This work introduces modifications to the STRIDE threat model based on the current literature, drone images provided by the NIST program, and a firmware static analysis of a zino hubsan brand drone.  ...  Repudiation is considered as the third risk factor in our model. It has been proven in (F. that the integrity of data is a concern when dealing with flying devices.  ... 
doi:10.15394/jdfsl.2021.1695 fatcat:qz7sqgflgzbnvexzn3m3hh3inu

Synthesis of attack actions using model checking for the verification of security protocols

Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
2009 Security and Communication Networks  
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the goals of the protocol.  ...  In our model checking approach, protocol correctness is checked by appropriate user-supplied assertions or reachability of invalid end states.  ...  A more recent contribution for the model checking of secrecy and authentication is the so-called "lazy intruder" [31] for the on-the-fly model checker of the AVISPA security toolset [32] .  ... 
doi:10.1002/sec.119 fatcat:bheus6c4wvhhhm5qhy5udnoa7m

Ensuring Authentication of Digital Information Using Cryptographic Accumulators [chapter]

Christophe Tartary
2009 Lecture Notes in Computer Science  
This makes our construction one of the least expensive protocols for this network model. Even if the sender processes the stream slightly in delay, the receivers can authenticate packets on-the-fly.  ...  Our first scheme is developed for erasure channels and its packet overhead is less than the length of a digest most of the time.  ...  Acknowledgments The author is grateful to the anonymous reviewers for their comments to improve the quality of this paper.  ... 
doi:10.1007/978-3-642-10433-6_21 fatcat:7765evkxl5drlfu7xew3gzxhx4

Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties [chapter]

Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier
2010 Lecture Notes in Computer Science  
In this article we compare time efficiency of these tools verifying some protocols of the litterature that are designed with such algebraic properties.  ...  Recently Kuesters et al proposed two new methods using ProVerif for analyzing cryptographic protocols with Exclusive-Or and Diffie-Hellman properties.  ...  For modelling the property of non-repudiation we follow the approach of L. Vigneron et al [24, 37] which expresses non-repudiation in term of authentication.  ... 
doi:10.1007/978-3-642-12459-4_13 fatcat:ulidyay2s5eh5apszidytikboi

Security and privacy issues in P2P streaming systems: A survey

Gabriela Gheorghe, Renato Lo Cigno, Alberto Montresor
2010 Peer-to-Peer Networking and Applications  
Our analysis emphasizes two major facts: (i) the Byzantine-Altruistic-Rational (BAR) model offers stronger security guarantees compared to other approaches, at the cost of higher complexity and overhead  ...  Starting from existing analyses and security models in the related literature, we give an overview on security and privacy considerations for P2P streaming systems.  ...  Non-repudiation is of interest only for video on demand applications, while for TV-like (broadcasting) it may be a minor feature.  ... 
doi:10.1007/s12083-010-0070-6 fatcat:hgg7fujecbdvpd7647lttvh2qm

Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-sensing and Blockchain [article]

Ruba Alkadi, Abdulhadi Shoufan
2021 arXiv   pre-print
The lack of such protocols renders the UTM system unscalable and prone to various cyber attacks.  ...  However, the adoption of UAV-assisted applications will strongly rely on the provision of reliable systems that allow managing UAV operations at high levels of safety and security.  ...  ACKNOWLEDGMENTS This work is fully funded by the Center for Cyber-physical Systems at Khalifa University.  ... 
arXiv:2110.14979v1 fatcat:yoit2ksuszg6hh26ahswwz3rl4
« Previous Showing results 1 — 15 out of 947 results