Search

Your search keyword '"COMPUTER network protocols"' showing total 32 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer security Remove constraint Topic: computer security Journal journal of computer security Remove constraint Journal: journal of computer security
32 results on '"COMPUTER network protocols"'

Search Results

1. StatVerif: Verification of stateful processes.

2. Establishing and preserving protocol security goals.

3. Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.

4. Analysing TLS in the strand spaces model.

5. Inductive trace properties for computational security.

6. Finite models for formal security proofs.

7. Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.

8. Detecting and preventing type flaws at static time.

9. Secrecy for bounded security protocols with freshness check is NEXPTIME-complete.

10. Timed analysis of security protocols.

11. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.

12. Analysis of probabilistic contract signing.

13. On the impossibility of building secure Cliques-type authenticated group key agreement protocols.

14. Secure set intersection cardinality with application to association rule mining.

15. A derivation system and compositional logic for security protocols.

16. Non‐interference proof techniques for the analysis of cryptographic protocols.

17. Relating multiset rewriting and process algebras for security protocol analysis.

18. Decidability of context‐explicit security protocols.

19. The faithfulness of abstract protocol analysis: Message authentication.

20. A formal model of rational exchange and its application to the analysis of Syverson's protocol.

21. Authentication tests and disjoint encryption: A design method for security protocols.

22. Polynomial liveness.

23. Types and effects for asymmetric cryptographic protocols.

24. Probabilistic analysis of an anonymity system.

25. Embedding agents within the intruder to detect parallel attacks.

26. Multiset rewriting and the complexity of bounded security protocols.

27. Some attacks upon authenticated group key agreement protocols.

28. A compositional logic for proving security properties of protocols.

29. Global infrastructure protection system.

30. Strand spaces: proving security protocols correct.

31. Towards a completeness result for model checking of security protocols.

32. Identification of host audit data to detect attacks on low-level IP vulnerabilities.

Catalog

Books, media, physical & digital resources