Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Cremers, C.J.F."'
Publikováno v:
In Theoretical Computer Science 2006 367(1):139-161
Publikováno v:
In Electronic Notes in Theoretical Computer Science 5 July 2005 135(1):23-38
Publikováno v:
Proceedings of the First International Workshop on Views on Designing Complex Architectures (VODCA 2004, Bertinoro, Italy, September 11-12, 2004), 99-110
STARTPAGE=99;ENDPAGE=110;TITLE=Proceedings of the First International Workshop on Views on Designing Complex Architectures (VODCA 2004, Bertinoro, Italy, September 11-12, 2004)
STARTPAGE=99;ENDPAGE=110;TITLE=Proceedings of the First International Workshop on Views on Designing Complex Architectures (VODCA 2004, Bertinoro, Italy, September 11-12, 2004)
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the verification of security protocols have been developed. However, their app
Autor:
Cremers, C.J.F.
Publikováno v:
Technical Report / ETH Zurich, Department of Computer Science, 572
We present a new cryptographic protocol verification tool called Scyther. The tool is stateof- the-art in terms of verification speed and provides a number of novel features. (1) It can verify most protocols for an unbounded number of sessions in les
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f1e62868524ad678bb1f7fcd8b916df4
Autor:
Cremers, C.J.F., Mauw, S.
Publikováno v:
Online Proceedings 1st Benelux Workshop on Information and System Security (WISSEC 2006, Antwerpen, Belgium, November 8-9, 2006)
We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::59a479aae5350f1f11fd73badeaca9b9
https://research.tue.nl/nl/publications/0cc5de98-6175-45af-8958-6d517f40f5bf
https://research.tue.nl/nl/publications/0cc5de98-6175-45af-8958-6d517f40f5bf
Autor:
Cremers, C.J.F.
Recent technologies have cleared the way for large scale application of electronic communication. The open and distributed nature of these communications implies that the communication medium is no longer completely controlled by the communicating pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::709e9c4c715da577090fe9dde7b9daac
https://research.tue.nl/nl/publications/28946646-3232-49c1-bfbc-bc463acf69de
https://research.tue.nl/nl/publications/28946646-3232-49c1-bfbc-bc463acf69de
Autor:
Cremers, C.J.F.
Publikováno v:
IPA Herfstdagen on Security, November 21-25, 2005
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::a6bf624f018fc06f5a17a280b3929296
https://research.tue.nl/nl/publications/e9311aec-3a8c-4dc4-9d4d-2494ec312f45
https://research.tue.nl/nl/publications/e9311aec-3a8c-4dc4-9d4d-2494ec312f45