86 results on '"security protocol"'
Search Results
2. Security and Privacy of Protocols and Software with Formal Methods
3. Tests for Establishing Security Properties
4. The Guided System Development Framework: Modeling and Verifying Communication Systems
5. Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
6. Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)
7. Knowledge-Based Automated Repair of Authentication Protocols
8. Automated Formal Verification of Application-specific Security Properties
9. Defendable Security in Interaction Protocols
10. Proved Generation of Implementations from Computationally Secure Protocol Specifications
11. Sound Security Protocol Transformations
12. Historical Background and Further Reading
13. Key Management Protocol in WIMAX Revisited
14. Security Protocol Verification: Symbolic and Computational Models
15. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
16. Protocol Implementation Generator
17. Towards Formal Validation of Trust and Security in the Internet of Services
18. A Formal Analysis of Authentication in the TPM
19. Resiliency Aspects of Security Protocols
20. Complexity of Anonymity for Security Protocols
21. Modeling and Analyzing Security in the Presence of Compromising Adversaries
22. Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
23. Automating Security Analysis: Symbolic Equivalence of Constraint Systems
24. Proof-Based Design of Security Protocols
25. Formal Verification of Application-Specific Security Properties in a Model-Driven Approach
26. Formally-Based Black-Box Monitoring of Security Protocols
27. Non-repudiation Analysis with LySa
28. Verifying Anonymous Credential Systems in Applied Pi Calculus
29. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
30. Let’s Get Physical: Models and Methods for Real-World Security Protocols
31. Models and Proofs of Protocol Security: A Progress Report
32. Comparing State Spaces in Automatic Security Protocol Analysis
33. Validating Integrity for the Ephemerizer’s Protocol with CL-Atse
34. Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables
35. Challenges in the Automated Verification of Security Protocols
36. The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis : Tool Paper
37. Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code
38. Formal Security Analysis of Electronic Software Distribution Systems
39. Modelling Accountability
40. Integrating Verification, Testing, and Learning for Cryptographic Protocols
41. Verifying Smart Card Applications: An ASM Approach
42. Safely Composing Security Protocols
43. Security Protocols: Principles and Calculi : Tutorial Notes
44. Deciding Key Cycles for Security Protocols
45. Deriving Secrecy in Key Establishment Protocols
46. Toward a Broader View of Security Protocols
47. Developing Provable Secure M-Commerce Applications
48. Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
49. Specifying Authentication Using Signal Events in CSP
50. A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.