AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm. By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol
<p>We present three case studies, investigating the use of probabilistic model checking to aut...
In this paper we consider a new and efficient optimistic nonrepudiationprotocol. In a non-repudiatio...
Non-repudiation protocols have an important role in many areas where secured transactions with proof...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairn...
none3noWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantee...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
AbstractWe advocate the use of approximate noninterference for the security analysis of probabilisti...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
<p>We present three case studies, investigating the use of probabilistic model checking to aut...
In this paper we consider a new and efficient optimistic nonrepudiationprotocol. In a non-repudiatio...
Non-repudiation protocols have an important role in many areas where secured transactions with proof...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairn...
none3noWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantee...
AbstractWe define a probabilistic model for the analysis of a Non-Repudiation protocol that guarante...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
AbstractWe advocate the use of approximate noninterference for the security analysis of probabilisti...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
<p>We present three case studies, investigating the use of probabilistic model checking to aut...
In this paper we consider a new and efficient optimistic nonrepudiationprotocol. In a non-repudiatio...
Non-repudiation protocols have an important role in many areas where secured transactions with proof...