Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
ProVerif
ProVerif is a software tool for automated reasoning about the security properties found in cryptographic protocols. The tool has been developed by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Automated reasoning
CryptoVerif
Cryptographic protocol
Direct Anonymous Attestation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Lightweight security protocol for health monitoring in Ambient Assisted Living environment
H. A. Hamadi
,
Amjad Gawanmeh
,
M. Al-Qutayri
IEEE International Conference on Communications…
2017
Corpus ID: 25787696
Security is one of the major challenges that affect the deployment of the biosensors that form Wireless Body Sensor Networks…
Expand
2017
2017
Formal Verification of Key Establishment for Dual Connectivity in Small Cell LTE Networks
V. Vassilakis
,
I. Moscholios
,
M. Logothetis
,
M. Koukias
2017
Corpus ID: 51748192
—Dual connectivity (DC) has been included in the Release 12 of the long-term evolution (LTE) standard. In this paper, we perform…
Expand
2015
2015
Secure Public Key Regime (SPKR) in vehicular networks
Hengchuan Tan
,
Jun Zhang
,
M. Ma
,
P. Chong
,
H. Labiod
International Conferences on Security of Smart…
2015
Corpus ID: 16237239
Public Key Regime (PKR) was proposed as an alternative to certificate based PKI in securing Vehicular Networks (VNs). It…
Expand
2014
2014
How to Formally Model Features of Network Security Protocols
Gyesik Lee
2014
Corpus ID: 54791432
We present a general idea of using formal methods in the verification of security protocols. In particular we show how to…
Expand
2014
2014
On securing online registration protocols: Formal verification of a new proposal
Jesús Díaz
,
David Arroyo
,
F. Ortiz
Knowledge-Based Systems
2014
Corpus ID: 42039504
2014
2014
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Morten Dahl
,
I. Damgård
IACR Cryptology ePrint Archive
2014
Corpus ID: 11668193
We consider a class of two-party function evaluation protocols in which the parties are allowed to use ideal functionalities as…
Expand
2012
2012
Sorted Psi-calculi with Generalised Pattern Matching
Johannes Borgstr¨om
,
Ramunas Gutkovas
,
J. Parrow
,
Björn Victor
,
Johannes Åman Pohjola
2012
Corpus ID: 17758142
Psi-calculi is a parametric framework for extensions of the pi-calculus, with arbitrary data structures and logical assertions…
Expand
2010
2010
User Authentication for Online Applications Using a USB-Based Trust Device
Julian Jang
,
Dongxi Liu
,
S. Nepal
,
J. Zic
Security and Privacy in Mobile Information and…
2010
Corpus ID: 2743556
We present a system that enables secure user authentication by leveraging a portable USB-based trusted device. The heart of our…
Expand
2008
2008
Extending the Input Language of Spi2Java
Cătălin Hriţcu
,
Alex Busenius
,
V. Ivanova
2008
Corpus ID: 58058998
Automatic code generation from formal models is an important approach for the secure implementation of cryptographic protocols…
Expand
2006
2006
Secure Negotiation in Virtual Organizations
Sakyibea Darko-Ampem
,
Maria Katsoufi
,
Pablo Giambiagi
10th IEEE International Enterprise Distributed…
2006
Corpus ID: 18629585
Virtual organizations are dynamic associations of business partners that join forces to achieve a common goal. Because partners…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE