نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

Journal: :International Journal of Computer Applications 2010

Journal: :Lecture Notes in Computer Science 2023

Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact and lightweight authenticated key exchange with ephemeral keys. It is expected to provide mutual authentication, forward secrecy, identity protection, 128-bit security level. A formal analysis has already been proposed SECRYPT ’21, on former version, leading some improvements, in the ongoing evaluation process by IETF. Unfo...

Journal: :Information and Software Technology 2009

Journal: :International Journal of Computer Applications 2014

Journal: :International Journal of Distributed Sensor Networks 2014

Journal: :KIPS Transactions on Computer and Communication Systems 2013

Journal: :Systems Engineering 2021

This paper proposes a Model-Driven Architecture approach for the development of an embedded system validation platform namely Model-Based Security Analysis Embedded Systems (MBSAES). The security properties are formally modeled and verified at early stage design process system, which helps to reduce late errors time. A separation attack scenarios from implementation details has been respected...

Journal: :IACR Transactions on Symmetric Cryptology 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید