Search

Your search keyword '"security protocol"' showing total 86 results

Search Constraints

Start Over You searched for: Descriptor "security protocol" Remove constraint Descriptor: "security protocol" Topic security property Remove constraint Topic: security property
86 results on '"security protocol"'

Search Results

1. A Brief History of Security Protocols

2. Security and Privacy of Protocols and Software with Formal Methods

3. Tests for Establishing Security Properties

4. The Guided System Development Framework: Modeling and Verifying Communication Systems

6. Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)

7. Knowledge-Based Automated Repair of Authentication Protocols

8. Automated Formal Verification of Application-specific Security Properties

9. Defendable Security in Interaction Protocols

10. Proved Generation of Implementations from Computationally Secure Protocol Specifications

11. Sound Security Protocol Transformations

14. Security Protocol Verification: Symbolic and Computational Models

15. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker

16. Protocol Implementation Generator

17. Towards Formal Validation of Trust and Security in the Internet of Services

18. A Formal Analysis of Authentication in the TPM

19. Resiliency Aspects of Security Protocols

20. Complexity of Anonymity for Security Protocols

21. Modeling and Analyzing Security in the Presence of Compromising Adversaries

22. Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries

24. Proof-Based Design of Security Protocols

25. Formal Verification of Application-Specific Security Properties in a Model-Driven Approach

26. Formally-Based Black-Box Monitoring of Security Protocols

28. Verifying Anonymous Credential Systems in Applied Pi Calculus

29. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks

30. Let’s Get Physical: Models and Methods for Real-World Security Protocols

31. Models and Proofs of Protocol Security: A Progress Report

32. Comparing State Spaces in Automatic Security Protocol Analysis

33. Validating Integrity for the Ephemerizer’s Protocol with CL-Atse

34. Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables

36. The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis : Tool Paper

37. Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code

38. Formal Security Analysis of Electronic Software Distribution Systems

39. Modelling Accountability

40. Integrating Verification, Testing, and Learning for Cryptographic Protocols

41. Verifying Smart Card Applications: An ASM Approach

42. Safely Composing Security Protocols

43. Security Protocols: Principles and Calculi : Tutorial Notes

44. Deciding Key Cycles for Security Protocols

45. Deriving Secrecy in Key Establishment Protocols

46. Toward a Broader View of Security Protocols

47. Developing Provable Secure M-Commerce Applications

48. Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario

49. Specifying Authentication Using Signal Events in CSP

50. A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol

Catalog

Books, media, physical & digital resources