Search

Your search keyword '"security protocol"' showing total 55 results

Search Constraints

Start Over You searched for: Descriptor "security protocol" Remove constraint Descriptor: "security protocol" Publisher springer international publishing Remove constraint Publisher: springer international publishing
55 results on '"security protocol"'

Search Results

4. Modelling a Fair-Exchange Protocol in the Presence of Misbehaviour Using PEPA

5. Comparative Analysis of Security Protocols in IoT

7. A Modeling and Verification Framework for Security Protocols

9. A Secure Key Management Technique Through Distributed Middleware for the Internet of Things

10. A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model

11. Research on K-Means Clustering Algorithm Over Encrypted Data

12. Graphene: A Secure Cloud Communication Architecture

13. Non-monotonic Security Protocols and Failures in Financial Intermediation

14. : Walking the Privacy Trail

18. A Role-Based Access Control System for Intelligent Buildings

19. FDR: From Theory to Industrial Application

20. A Brief History of Security Protocols

22. On Attacker Models and Profiles for Cyber-Physical Systems

23. Performance Modelling of Optimistic Fair Exchange

24. Guided Specification and Analysis of a Loyalty Card System

25. Automated Verification of Timed Security Protocols with Clock Drift

26. SPEC: An Equivalence Checker for Security Protocols

27. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions

28. Security and Privacy of Protocols and Software with Formal Methods

32. The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)

33. Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods

34. Checking Trace Equivalence: How to Get Rid of Nonces?

35. Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems

36. Verifying Parameterized Timed Security Protocols

37. A Framework for Analyzing Verifiability in Traditional and Electronic Exams

38. Automatic Verification for Later-Correspondence of Security Protocols

39. Secure Improved Cloud-Based RFID Authentication Protocol

42. Security Goals and Evolving Standards

43. A Provable Secure Batch Authentication Scheme for EPCGen2 Tags

44. Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)

45. Formal Analysis of DAA-Related APIs in TPM 2.0

46. A Hybrid Analysis for Security Protocols with State

47. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif

48. Electronic Voting: How Logic Can Help

49. Knowledge-Based Automated Repair of Authentication Protocols

50. Automated Formal Verification of Application-specific Security Properties

Catalog

Books, media, physical & digital resources