Analysis of Security Protocolse
نویسندگان
چکیده
Several approaches have been developed for analyzing security protocols. Most formal approaches are based on a set of assumptions commonly referred to as the “Dolev-Yao model.” In this paper, we use a formalism based on multiset rewriting to describe these modeling assumptions and explain how they are used in protocol analysis. The unifying formalism makes it possible to discuss general optimizations and protocol simplifications that may be used in a variety of approaches. We also summarize some projects using the Dolev-Yao model and explain connections between our formalism and others in current use.
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملThe Role of Social Factors in the Explanation of Vandalism among High School Students in Andimeshk Focusing on the Social Security
This paper tries to study the role of social factors in the explanation of vandalism among high school students in Andimeshk. Focusing on the social security. Through survey study more than 300 ones were selected by Cochoran Formula. After gathering he data through questionnaire, they were analyzed by Pearson Coefficient Correlation, Variance Analysis test, Multi-variable regression and path a...
متن کاملThe Role of Security in Social Deviations
The aim of this study is to investigate the role of security in social deviations among women of Babol city. Descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of Cochran formula and using multi-stage random cluster sampling. The results show that there is a weak significant relationship between the independent v...
متن کاملMeasuring gas demand security using Principal Component Analysis (PCA): A case study
Safeguarding the energy security is an important energy policy goal of every country. Assuring sufficient and reliable resources of energy at affordable prices is the main objective of energy security. Due to such reasons as special geopolitical position, terrorist attacks and other unrest in the Middle East, securing Iran’s energy demand and increasing her natural gas exports have turned into ...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999