Zobrazeno 1 - 10
of 1 086
pro vyhledávání: '"cryptographic protocol analysis"'
Autor:
Malladi, Sreekanth
In this paper, we show a new tagging scheme for cryptographic protocol messages. Under this tagging, equational theories of operators such as exclusive-or, binary addition etc. are effectively disabled, when terms are unified. We believe that this re
Externí odkaz:
http://arxiv.org/abs/1003.5406
Publikováno v:
21st International Conference on Cryptology in India, 2020
21st International Conference on Cryptology in India, 2020, Dec 2020, Bangalore, India
CCSW@CCS
Progress in Cryptology – INDOCRYPT 2020 ISBN: 9783030652760
INDOCRYPT
HAL
21st International Conference on Cryptology in India, 2020, Dec 2020, Bangalore, India
CCSW@CCS
Progress in Cryptology – INDOCRYPT 2020 ISBN: 9783030652760
INDOCRYPT
HAL
International audience; Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c648021351c634f0eb56c64739c39219
https://hal.archives-ouvertes.fr/hal-03325360/file/2019-971.pdf
https://hal.archives-ouvertes.fr/hal-03325360/file/2019-971.pdf
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Rewriting Logic and Its Applications ISBN: 9783031124402
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79b73d0a70cbaf3e40152b4ad8dec334
https://doi.org/10.1007/978-3-031-12441-9_13
https://doi.org/10.1007/978-3-031-12441-9_13
Autor:
Gorrieri, Roberto *, Martinelli, Fabio
Publikováno v:
In Science of Computer Programming 2004 50(1):23-49
Autor:
John Ramsdell
Publikováno v:
Protocols, Strands, and Logic ISBN: 9783030916305
The Cryptographic Protocol Shapes Analyzer cpsa determines if a cryptographic protocol achieves authentication and secrecy goals. It can be difficult to ensure that an implementation of a protocol matches up with what cpsa analyzed, and therefore be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a395f428d5382422267fc8bf634dac06
https://doi.org/10.1007/978-3-030-91631-2_20
https://doi.org/10.1007/978-3-030-91631-2_20
Autor:
Millen, J.
Publikováno v:
In Electronic Notes in Theoretical Computer Science 2000 36:229-234
Publikováno v:
Journal of Software. 20:3060-3076
Autor:
Catherine Meadows
Publikováno v:
IEEE Journal on Selected Areas in Communications. 21:44-54
The history of the application of formal methods to cryptographic protocol analysis spans over 20 years and has been showing signs of new maturity and consolidation. Not only have a number of specialized tools been developed, and general-purpose ones
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.