搜索结果: 1-8 共查到“军事学 Security Protocols”相关记录8条 . 查询时间(0.1 秒)
Security Analysis for Randomness Improvements for Security Protocols
cryptographic protocols Security Protocols
2018/11/2
Many cryptographic mechanisms depend on the availability of secure random numbers. In practice, the sources of random numbers can be unreliable for many reasons. There exist ways to improve the reliab...
A new paradigm in secure protocol design is to hold parties accountable for misbehaviour instead of postulating that they are trustworthy. Recent approaches in defining this property, called accountab...
No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial
protocols definitions partnering
2017/9/1
An essential cornerstone of the definition of security for key exchange protocols is the notion of partnering. It defines when two protocol instances can be considered to have communicated with each o...
A Timed Logic for Modeling and Reasoning about Security Protocols
timed logic security protocols formal method
2010/12/22
Many logical methods are usually considered suitable to express the static properties of security protocols while unsuitable to model dynamic processes or properties. However, a security protocol itse...
A Computationally Sound Mechanized Prover for Security Protocols
Computationally Sound Mechanized Prover Security Protocols
2009/3/16
We present a new mechanized prover for secrecy properties of
security protocols. In contrast to most previous provers, our tool
does not rely on the Dolev-Yao model, but on the computational
model....
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
Cryptographic Protocols Diffie-Hellman Soundness of Formal Encryption
2009/1/22
Recently, it has been proved that computational security can be automatically
verified using the Dolev-Yao abstraction. We extend these results by adding a widely used
component for cryptographic pr...
The Layered Games Framework for Specifications and Analysis of Security Protocols
Layered Games Framework Specifications Security Protocols
2008/12/29
We establish rigorous foundations to the use of modular,
layered design for building complex distributed systems, resilient to failures
and attacks. Layering is key to the design of the Internet and...
Security Protocols with Isotropic Channels
Unconditional security secret-key agreement provable security
2008/12/29
We investigate the security properties of isotropic channels, broadcast media in which a receiver cannot reliably determine whether a message originated from any particular sender and a sender cannot ...