نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

Journal: :Journal of Computer Security 2009

Journal: :Electronic Notes in Theoretical Computer Science 2003

Journal: :Journal of cybersecurity and privacy 2021

Marine network protocols are domain-specific that aim to incorporate particular features within the specialized marine context devices implemented in. Devices in such vessels involve critical equipment; however, limited research exists for protocol security. In this paper, we provide an analysis of several used today’s and a classification attack risks. Several known security limitations, as Au...

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

Journal: :CoRR 2016
Mohsen Toorani

Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on securit...

2007
Tom Coffey Reiner Dojen

This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of securi...

2007
Shinsaku KIYOMOTO Haruki OTA Toshiaki TANAKA

In this paper, we present a efficient security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies security protocols based on notions of provable security. The analyzer only checks whether the core properties of security protocols satisfy the notions, making it faster than previous tools. The analyzer automatically checks whether authentication and key distribut...

Journal: :Information and Control 1982

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید