International Journal of Communications, Network and System Sciences

International Journal of Communications, Network and System Sciences

ISSN Print: 1913-3715
ISSN Online: 1913-3723
www.scirp.org/journal/ijcns
E-mail: ijcns@scirp.org
"A Comparative Analysis of Tools for Verification of Security Protocols"
written by Nitish Dalal, Jenny Shah, Khushboo Hisaria, Devesh Jinwala,
published by International Journal of Communications, Network and System Sciences, Vol.3 No.10, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Timed automata as a formalism for expressing security: A survey on theory and practice
ACM Computing Surveys (CSUR), 2022
[2] A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
Journal of Sensor and …, 2022
[3] RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral
2022 Thirteenth International …, 2022
[4] The Model Checking D2D and Centralised IOT authentication Protocols.
SPAST Abstracts, 2021
[5] eSIM‐Based Authentication Protocol for UAV Remote Identification
… and Privacy in the Internet of …, 2021
[6] An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems
IEEE Transactions on …, 2021
[7] Verificação Automática dos Protocolos de Segurança Needham-Schroeder, WMF e CSA com a ferramenta Scyther
2020
[8] Preuves formelles de la sécurité de standards: Un objectif nécessaire, possible grâce à EasyCrypt
2020
[9] Formal security proofs of cryptographic standards
2020
[10] Introducão a verificação automática de protocolos de seguranca com scyther
2020
[11] A study of Secure cryptographic based Hardware security module in a cloud environment
2020
[12] New design of lightweight authentication protocol in wearable technology
2019
[13] Verificaç ao Automática de Protocolos de Segurança com a ferramenta Scyther
2019
[14] Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC
2019
[15] Verificação Automática de Protocolos de Segurança com a ferramenta Scyther
2019
[16] Minicursos da XVII Escola Regional de Redes de Computadores
2019
[17] New Design of Lightweight Authentication Protocol in Wearable Technology to Prevent User Impersonation Attack
2019
[18] Formal security analysis of LoRaWAN
2019
[19] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
2019
[20] A Novel Approach towards Secure IO Transactions Implementation and Validation for Smart Phones
2018
[21] Upgrading the S-NCI Key Establishment Protocol Scheme to be Secure and Applicable
2018
[22] A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
2018
[23] التحقق من البروتوكولات الأمنية باستخدام الطرق الرسمية‎
2018
[24] Mobile user authentication system (MUAS) for e-commerce applications
2017
[25] Enhancing the Security of Centralised and Distributed Payments
2017
[26] A secure end‐to‐end SMS‐based mobile banking protocol
International Journal of Communication Systems, 2017
[27] Development of Key Exchange Protocol to Enhance Security of Voice over Internet Protocol on Mobile Phone
International Journal on Electrical Engineering and Informatics, 2017
[28] Verification of STAR-Vote and Evaluation of FDR and ProVerif
2017
[29] Security and Privacy Aspects of Automotive Systems
2017
[30] CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS-A SURVEY.
2017
[31] Secure lightweight ECC-based protocol for multi-agent IoT systems
2017
[32] CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS-A SURVEY
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, 2017
[33] Formal security analysis of the DNP3-secure authentication protocol
2016
[34] Protocol, mobility and adversary models for the verification of security
Thesis, 2016
[35] 3LS-Authenticate: an e-Commerce Challenge-Response Mobile Application
2016
[36] 3LS-authenticate: an e-commerce challenge-response mobile application.
2016
[37] Secure authentication framework for cloud
2016
[38] Formal Verification of Privacy in Pervasive Systems
2015
[39] A Trusted IaaS Environment with Hardware Security Module
2015
[40] An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack
Journal of Information Security, 2015
[41] Automated Verification of Exam, Cash, Reputation, and Routing Protocols
2015
[42] Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties
2015
[43] Modelling and Analysing a WSN Secure Aggregation Protocol: A Comparison of Languages and Tool Support
2015
[44] SATMC: a SAT-based model checker for security protocols, business processes, and security APIs
International Journal on Software Tools for Technology Transfer, 2014
[45] 安全协议形式化分析工具比较研究
密码学报, 2014
[46] A BSP algorithm for on-the-fly checking CTL* formulas on security protocols
The Journal of Supercomputing, 2014
[47] BSP, bon à toutes les sauces (Habilitation Thesis, HDR)
Habilitation thesis, 2014
[48] Preuve formelle d'algorithmes parallèles pour la génération de l'espace d'état et la vérification de protocoles de sécurité
F Gava, F Pommereau, J Fortin - ibisc.univ-evry.fr, 2014
[49] BSP-Why: a Tool for Deductive Verification of BSP Programs
2013
[50] BSP-Why, un outil pour la vérification déductive de programmes BSP: machine-checked semantics and application to distributed state-space algorithms
2013
[51] Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer
Proceedings of the third …, 2013
[52] Extension d'un langage de description des protocoles de sécurité et traduction vers une algèbre de réseaux de Petri
F Pommereau, F Gava - lacl.u-pec.fr, 2012
[53] Traduction et extension d'un langage de description des protocoles de sécurité vers une algèbre de réseaux de Petri
F Gava, S Tan, F Pommereau - ibisc.univ-evry.fr, 2012
[54] Formal Verification of Secrecy in Group Key Protocols Using Event-B
Int'l J. of Communications, Network and System Sciences, 2012
[55] Formal verification of cryptographic protocols with automated reasoning
2011
[56] Automatic surveillance video matting using a shape prior
2011
[57] Comparing a Pair of Security Analysis Tools: SATMC and ProVerif
A Amara - verify.iaik.tugraz.at, 2010
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top