AbstractIn certified email (CEM) protocols, TTP transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual usersʼ privacy. Recently we have extended the CEM protocol of Cederquist et al. to satisfy TTP transparency. As a continuation, in this paper, we formally verify the security requirement in the exteded protocol. The properties of fairness, effectiveness and timeliness are checked in the model checker Mocha, and TTP transparency is analysed in the toolsets μCRL and CADP. The results confirm that our proposed extension achieves our design goals
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
In certified email (CEM) protocols, TTP transparency is an important security requirement which help...
Abstract In certified email (CEM) protocols, TTP trans-parency is an important security requirement ...
peer reviewedIn certified email (CEM) protocols, trusted third party (TTP) transparency is an import...
Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduc...
Abstract—Cederquist et al. proposed an optimistic certified email protocol, which employs key chains...
Certified email protocols to facilitate secureelectronic mail delivery are necessary if the Internet...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
This paper describes the design and prototype implementation of a comprehensive system for securing ...
In this paper we use the formal language LOTOS to specify the Equicrypt protocol and verify its robu...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
In certified email (CEM) protocols, TTP transparency is an important security requirement which help...
Abstract In certified email (CEM) protocols, TTP trans-parency is an important security requirement ...
peer reviewedIn certified email (CEM) protocols, trusted third party (TTP) transparency is an import...
Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduc...
Abstract—Cederquist et al. proposed an optimistic certified email protocol, which employs key chains...
Certified email protocols to facilitate secureelectronic mail delivery are necessary if the Internet...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
This paper describes the design and prototype implementation of a comprehensive system for securing ...
In this paper we use the formal language LOTOS to specify the Equicrypt protocol and verify its robu...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...