Analysis of Security Protocolse

نویسندگان

  • Nancy A. DURGIN
  • John C. MITCHELL
چکیده

Several approaches have been developed for analyzing security protocols. Most formal approaches are based on a set of assumptions commonly referred to as the “Dolev-Yao model.” In this paper, we use a formalism based on multiset rewriting to describe these modeling assumptions and explain how they are used in protocol analysis. The unifying formalism makes it possible to discuss general optimizations and protocol simplifications that may be used in a variety of approaches. We also summarize some projects using the Dolev-Yao model and explain connections between our formalism and others in current use.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

The Role of Social Factors in the Explanation of Vandalism among High School Students in Andimeshk Focusing on the Social Security

This paper tries to study the role of social  factors in the explanation of vandalism among high school students in Andimeshk. Focusing on the social security. Through survey study more than 300 ones were selected by Cochoran Formula. After gathering he data through questionnaire, they were analyzed by Pearson Coefficient Correlation, Variance Analysis test, Multi-variable regression and path a...

متن کامل

The Role of Security in Social Deviations

The aim of this study is to investigate the role of security in social deviations among women of Babol city. Descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of Cochran formula and using multi-stage random cluster sampling. The results show that there is a weak significant relationship between the independent v...

متن کامل

Measuring gas demand security using Principal Component Analysis (PCA): A case study

Safeguarding the energy security is an important energy policy goal of every country. Assuring sufficient and reliable resources of energy at affordable prices is the main objective of energy security. Due to such reasons as special geopolitical position, terrorist attacks and other unrest in the Middle East, securing Iran’s energy demand and increasing her natural gas exports have turned into ...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999