Formal analysis

Results: 1589



#Item
1Cryptography / Pyruvate dehydrogenase lipoamide kinase isozyme 1 / Key management / Digital signature / Key

Formal Analysis of Key Management APIs Graham Steel INRIA & LSV, ENS de Cachan 1/48

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-08-26 04:16:26
2Computing / Computer access control / Computer security / Cloud standards / Federated identity / Security / OAuth / Cross-site request forgery / OpenID / Cross-site scripting / Social login / HTTP cookie

Discovering Concrete Attacks on Website Authorization by Formal Analysis

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-01-06 10:29:30
3Computing / Software engineering / Data types / Computer programming / Primitive types / Formal languages / Formal methods / ANSI/ISO C Specification Language / C / String / Frama-C / Permutation

Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:15
4Cryptography / Computing / Secure communication / Cryptographic software / Cryptographic protocols / Transport Layer Security / Internet Standards / HTTPS / Password / Public-key cryptography / Client-side / Key

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2013-01-25 08:24:32
5Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / Identity provider / OpenID / Single sign-on / Authentication / Relying party / SAML-based products and services

A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-06-14 12:33:34
6Abstract data types / Queue / Double-ended queue / Dequeue / Statistical theory / Probability and statistics / Economy

Amortised Resource Analysis and Functional Correctness with Separation Logic (Part II) Summer School on Formal Reasoning and Representation of Complex Systems

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-08-26 04:16:32
7

Formal Expression of BBc-1 Mechanism and Its Security Analysis Jun KURIHARA† and Takeshi KUBO†† † ††

Add to Reading List

Source URL: beyond-blockchain.org

Language: English - Date: 2017-10-30 20:24:43
    8

    Modelling, Specification and Formal Analysis of Complex Software Systems - Precise Static Analysis of Programs with Dynamic Memory

    Add to Reading List

    Source URL: resources.mpi-inf.mpg.de

    Language: English - Date: 2015-09-14 05:22:47
      9

      Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild, Kevin Milner Department of Computer Science, University of Oxford. {cas.cremers,martin.dehnel-wild,kevin.milner}@cs.ox.a

      Add to Reading List

      Source URL: www.cs.ox.ac.uk

      Language: English - Date: 2017-06-22 17:04:38
        10

        Formal analysis of privacy in Direct Anonymous Attestation schemes Ben Smyth1 , Mark D. Ryan2 , and Liqun Chen3 1 Mathematical and Algorithmic Sciences Lab, France Research

        Add to Reading List

        Source URL: www.cs.bham.ac.uk.

        Language: English - Date: 2015-11-29 07:19:40
          UPDATE