Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing its limits, we define a new method based on the handling of the knowledge of protocol participants. This method is very general and is of natural use, as it consists in adding simple annotations, like for authentication problems. The method is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA ...
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analy...
International audienceUse of formal methods is considered as a useful and efficient technique for th...
none3noWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantee...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
Non-repudiation protocols have an important role in many areas where secured transactions with proof...
Abstract. Non-repudiation protocols have an important role in many areas where secured transactions ...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Non-repudiation protocols must ensure that when two parties exchange informations over a network, ne...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
Abstract. An approach to protocol analysis using asynchronous product automata (APA) and the simple ...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
The date of receipt and acceptance will be inserted by the editor Abstract We analyzed two non-repud...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analy...
International audienceUse of formal methods is considered as a useful and efficient technique for th...
none3noWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantee...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
Non-repudiation protocols have an important role in many areas where secured transactions with proof...
Abstract. Non-repudiation protocols have an important role in many areas where secured transactions ...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Non-repudiation protocols must ensure that when two parties exchange informations over a network, ne...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
Abstract. An approach to protocol analysis using asynchronous product automata (APA) and the simple ...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
The date of receipt and acceptance will be inserted by the editor Abstract We analyzed two non-repud...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analy...
International audienceUse of formal methods is considered as a useful and efficient technique for th...
none3noWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantee...