Pang, Jun ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Zhang, C.
External co-authors :
yes
Language :
English
Title :
Verification of a key-chain based TTP transparent CEM protocol
Publication date :
2011
Event name :
3rd Workshop on Harnessing Theories for Tool Support in Software
Event date :
2010
Audience :
International
Main work title :
Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software
Publisher :
Elsevier
Collection name :
Electronic Notes in Theoretical Computer Science 274
M. Abadi, and B. Blanchet Computer-assisted verification of a protocol for certified email protocol Science of Computer Programming 58 2005 3 27 (Pubitemid 41261375)
M. Abadi, and C. Fournet Mobile values, new names, and secure communication Proc. 28th Symposium on Principles of Programming Languages (POPL) 2001 104 115
R. Alur, T.A. Henzinger, and O. Kupferman Alternating-time temporal logic Journal of ACM 49 2002 672 713
R. Alur, T.A. Henzinger, F.Y.C. Mang, S. Qadeer, S.K. Rajamani, and S. Tasiran Mocha: Modularity in model checking Proc. 10th International Conference on Computer Aided Verification (CAV) LNCS vol. 1427 1998 521 525 (Pubitemid 128092368)
N. Asokan, M. Waidner, and M. Schunter Optimistic protocols for fair exchange Proc. 4th ACM conference on Computer and Communications Security (CCS) 1997 7 17
S.C.C. Blom, J.R. Calame, B. Lisser, S.M. Orzan, J. Pang, J.C. van de Pol, M. Torabi Dashti, and A.J. Wijs Distributed analysis with μCRL: a compendium of case studies Proc. 13th Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) LNCS vol. 4424 2007 683 689 (Pubitemid 350259329)
S.C.C. Blom, W.J. Fokkink, J.F. Groote, I.A. van Langevelde, B. Lisser, and J.C. van de Pol DμCRL: A tool set for analysing algebraic specifications Proc. 13th Conference on Computer Aided Verification (CAV) LNCS vol. 2102 2001 250 254 (Pubitemid 33312921)
J. Cederquist, R. Corin, and M. Torabi Dashti On the quest for impartiality: design and analysis of a fair non-repudiation protocol Proc. 7th Conference on Information and Communications Security (ICICS) LNCS vol. 3783 2005 27 39
J. Cederquist, M. Torabi Dashti, and S. Mauw A certified email protocol using key chains Proc. 3rd Symposium on Security in Networks and Distributed Systems (SSNDS) 2007 525 530 (Pubitemid 47565435)
R. Chadha, S. Kremer, and A. Scedrov Formal analysis of multi-party contract signing Journal of Automated Reasoning 36 2006 39 83 (Pubitemid 44601133)
J.-C. Fernandez, H. Garavel, A. Kerbrat, L. Mounier, R. Mateescu, and M. Sighireanu Cadp - a protocol validation and verification toolbox Proc. 8th Conference on Computer-Aided Verification (CAV) LNCS vol. 1102 1996 437 440 (Pubitemid 126101309)
R.-J. Hwang, and C.-H. Lai Efficient and secure protocol in fair e-mail delivery WSEAS Transactions on Information Science and Applications 5 2008 1385 1394
S. Kremer, and J.-F. Raskin A game-based verification of non-repudiation and fair exchange protocols Journal of Computer Security 11 2003 399 429
Liu, Z., Extending a Certified Email Protocol with TTP Transparency and its Formal Verification," Masters thesis, University of Luxembourg (2010).
Liu, Z., J. Pang and C. Zhang, Extending a key-chain based certified email protocol with transparent TTP, in: Proc. 6th IEEE/IFIP Symposium on Trusted Computing and Communications (TrustCom) (2010), to appear.
O. Markowitch, and S. Kremer An optimistic non-repudiation protocol with transparent trusted third party Proc. 4th International Conference on Information Security (ICISC) LNCS vol. 2200 2001 363 378 (Pubitemid 33354318)
Micali, S., Certified email with invisible post offices (1997), an invited presentation at the RSA97 conference.
S. Micali Simple and fast optimistic protocols for fair electronic exchange Proc. 22th Annual Symposium on Principles of Distributed Computing (PODC) 2003 12 19
A. Nenadić, N. Zhang, and S. Barton Fair certified e-mail delivery Proc. 19th ACM Symposium on Applied Computing (ACM-SAC) 2004 391 396
J.A. Onieva, J. Zhou, and J. Lopez Multiparty nonrepudiation: A survey ACM Computing Surveys 41 2008 1 43
G. Wang Generic non-repudiation protocols supporting transparent off-line TTP Journal of Computer Security 14 2006 441 467 (Pubitemid 44728271)
F. Zhang, R. Safavi-Naini, and W. Susilo Efficient verifiably encrypted signature and partially blind signature from bilinear pairings Proc. 5th International Conference on Cryptology in India (INDOCRYPT) LNCS vol. 2904 2003 71 84
Y. Zhang, C. Zhang, J. Pang, and S. Mauw Game-based verification of multi-party contract signing protocols Proc. 6th International Workshop on Formal Aspects in Security and Trust (FAST) LNCS vol. 5983 2009 186 200