نتایج جستجو برای: cryptographic protocols

تعداد نتایج: 116404  

Journal: :International Journal of Modeling and Optimization 2015

2011
Stéphanie Delaune

Security is a very old concern, which until quite recently was mostly of interest for military purposes. The deployment of electronic commerce changes this drastically. The security of exchanges is ensured by cryptographic protocols which are notoriously error prone. The formal veri cation of cryptographic protocols is a di cult problem that can be seen as a particular model-checking problem in...

1990
Walter Fumy Michael Munzert

The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need tu explicate key distribution protocols in a way that allows to understand which results t...

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

2008
Andrei Lapets

We survey at a very high level some examples of existing work involving the formal verification of the properties of cryptographic protocols. For the purposes of this survey, formal verification includes the use of logics, proof systems, and inductive reasoning. The goal of this survey is twofold. First, it reviews a few existing attempts found in the literature to model cryptographic protocols...

2013
Jan Hajny Lukas Malina Zdenek Martinasek Ondrej Tethal

The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major...

Journal: :Mathematical and Computer Modelling 2007
Pino Caballero-Gil Candelaria Hernández-Goya Carlos Bruno-Castañeda

This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of twoparty cryptographic protocols are here combined in order to model the latters as the formers. One of the main ...

2004
KIERAN HEALY TOM COFFEY REINER DOJEN

State-space techniques have been proved successful as a means for finding attacks on security protocols. As well as reproducing known flaws, state-space techniques has also been used to discover new flaws in protocols In this paper, a brief overview of current state-space techniques is given and a selection of state-space tools for verifying cryptographic protocols are described, indicating the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید