نتایج جستجو برای: cryptographic protocols

تعداد نتایج: 116404  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :IEE Proceedings - Computers and Digital Techniques 1994

Journal: :the modares journal of electrical engineering 2003
said jalili behruz - tork ladani

logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenari...

Journal: :ACM Transactions on Economics and Computation 2013

Journal: :Formal Aspects of Computing 2013

Journal: :Information Processing Letters 2010

Journal: :Electronic Notes in Theoretical Computer Science 2000

Journal: :Science of Computer Programming 2003

Journal: :International Journal of Security and Its Applications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید