Wiedling, C., Rochet, F., Pereira, O.: Proverif implementation of the fido protocol. Rochet, F.: Modified fido client as a chrome extension. Rochet, F.: Fido compliant library and Java web application example. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. Pfitzmann, B., Waidner, M.: Federated identity-management protocols. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Küsters, R., Truderung, T.: Reducing protocol analysis with XOR to the XOR-free Case in the Horn Theory based approach. In: Jøsang, A., Samarati, P., Petrocchi, M. Künnemann, R., Steel, G.: YubiSecure? Formal security analysis results for the Yubikey and YubiHSM. Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. Kremer, S., Künnemann, R.: Automated analysis of security protocols with global state. In: di Vimercati, S.C., Syverson, P., Gollmann, D. Groß, T., Pfitzmann, B., Sadeghi, A.-R.: Browser model for security analysis of browser-based protocols. 21(1), 89–148 (2013)Ĭortier, V., Wiedling, C.: A formal analysis of the Norwegian E-voting protocol. Going forward, all new Microsoft cloud regions will also have availability zones at launch, which should. Ĭortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. This week, after rolling out availability zones within 11 of its more than 60 cloud regions since 2018, Microsoft said that every country in which it operates will have at least one region that offers availability zones by the end of 2021. Ĭheval, V.: APTE: an algorithm for proving trace equivalence. In: 14th IEEE Computer Security Foundations Workshop (CSFW) (2001)Ĭhadha, R., Ciobâcă, Ş., Kremer, S.: Automated verification of equivalence properties of cryptographic protocols. IEEE (2012)īlanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. In: ACM Conference on Computer and Communications Security (CCS) (2010)īonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. īortolozzo, M., Centenaro, M., Focardi, R., Steel, G.: Attacking and fixing PKCS#11 security tokens. įIDO Alliance: FIDO U2F JavaScript API, September 2016. In: 28th ACM Symposium on Principles of Programming Languages (POPL) (2001)įIDO Alliance: Fido security reference, September 2016. ACM (2008)Ībadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 6th ACM workshop on Formal Methods in Security Engineering, pp. Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google apps.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |