نتایج جستجو برای: cryptographic protocols

تعداد نتایج: 116404  

2009
Bradley Cowie Barry Irwin

The eld of Information Security and the sub eld of cryptographic protocols are both vast and continually evolving and expanding elds. The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both encryption and authentication to data transfer, has become increasingly popular. I intend to discuss the need for research into...

2000
Jean Goubault-Larrecq

We present an automatic, terminating method for verifying confidentiality properties, and to a lesser extent freshness properties of cryptographic protocols. It is based on a safe abstract interpretation of cryptographic protocols using a specific extension of tree automata, _-parameterized tree automata, which mix automata-theoretic techniques with deductive features. Contrary to most model-ch...

1997
J. P. Bekmann P. de Goede

Multi-dimensional security analysis is effective in creating cryptographic protocols since it encompasses a variety of analysis techniques, thereby providing a higher security confidence than individual approaches. SPEAR, the Security Protocol Engineering and Analysis Resource, is a protocol engineering tool which focuses on security protocols, with the specific aim of producing secure and effi...

2007
Jihong Han Zhiyong Zhou Yadi Wang

this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be prese...

2006
Lelde Lace Oksana Scegulnaja-Dubrovska Ramuns Usovs Agnese Zalcmane

The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several p...

Journal: :The Journal of Logic and Algebraic Programming 2009

Journal: :International Journal of Network Security & Its Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید