Now showing items 1-2 of 2

    • Knowledge Flow Analysis for Security Protocols 

      Torlak, Emina; van Dijk, Marten; Gassend, Blaise; Jackson, Daniel; Devadas, Srinivas (2005-10-19)
      Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...
    • Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version) 

      Sarmenta, Luis F. G.; van Dijk, Marten; O'Donnell, Charles W.; Rhodes, Jonathan; Devadas, Srinivas (2006-09-11)
      A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...