找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Operational Semantics and Verification of Security Protocols; Cas Cremers,Sjouke Mauw Textbook 2012 Springer-Verlag Berlin Heidelberg 2012

[復(fù)制鏈接]
查看: 36116|回復(fù): 41
樓主
發(fā)表于 2025-3-21 17:42:33 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Operational Semantics and Verification of Security Protocols
編輯Cas Cremers,Sjouke Mauw
視頻videohttp://file.papertrans.cn/703/702040/702040.mp4
概述Presents a methodology for formally describing security protocols and their environment.All technical chapters include problems, so the book is suited for graduate students of information security or
叢書名稱Information Security and Cryptography
圖書封面Titlebook: Operational Semantics and Verification of Security Protocols;  Cas Cremers,Sjouke Mauw Textbook 2012 Springer-Verlag Berlin Heidelberg 2012
描述.Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. .The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool..The methodology’s strong mathematical basis, the str
出版日期Textbook 2012
關(guān)鍵詞Correctness; Formal methods; Information security; Intruder model; Scyther; Secrecy; Security protocols; Se
版次1
doihttps://doi.org/10.1007/978-3-540-78636-8
isbn_softcover978-3-642-43053-4
isbn_ebook978-3-540-78636-8Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightSpringer-Verlag Berlin Heidelberg 2012
The information of publication is updating

書目名稱Operational Semantics and Verification of Security Protocols影響因子(影響力)




書目名稱Operational Semantics and Verification of Security Protocols影響因子(影響力)學(xué)科排名




書目名稱Operational Semantics and Verification of Security Protocols網(wǎng)絡(luò)公開度




書目名稱Operational Semantics and Verification of Security Protocols網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Operational Semantics and Verification of Security Protocols被引頻次




書目名稱Operational Semantics and Verification of Security Protocols被引頻次學(xué)科排名




書目名稱Operational Semantics and Verification of Security Protocols年度引用




書目名稱Operational Semantics and Verification of Security Protocols年度引用學(xué)科排名




書目名稱Operational Semantics and Verification of Security Protocols讀者反饋




書目名稱Operational Semantics and Verification of Security Protocols讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

1票 100.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:21:12 | 只看該作者
https://doi.org/10.1007/978-3-540-78636-8Correctness; Formal methods; Information security; Intruder model; Scyther; Secrecy; Security protocols; Se
板凳
發(fā)表于 2025-3-22 02:39:32 | 只看該作者
地板
發(fā)表于 2025-3-22 07:39:14 | 只看該作者
Operational Semantics and Verification of Security Protocols978-3-540-78636-8Series ISSN 1619-7100 Series E-ISSN 2197-845X
5#
發(fā)表于 2025-3-22 09:28:23 | 只看該作者
Cas Cremers,Sjouke MauwPresents a methodology for formally describing security protocols and their environment.All technical chapters include problems, so the book is suited for graduate students of information security or
6#
發(fā)表于 2025-3-22 15:24:16 | 只看該作者
7#
發(fā)表于 2025-3-22 18:34:29 | 只看該作者
8#
發(fā)表于 2025-3-23 01:04:25 | 只看該作者
9#
發(fā)表于 2025-3-23 04:14:41 | 只看該作者
10#
發(fā)表于 2025-3-23 07:07:14 | 只看該作者
Verification,We present an algorithm for the analysis of security protocols with respect to various security properties. We address design choices and efficiency considerations. Finally, we address the verification of injective synchronisation and prove that under certain conditions on their structure, synchronising protocols satisfy injectivity.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 19:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
观塘区| 磐石市| 红原县| 徐闻县| 舒兰市| 喜德县| 长白| 确山县| 潞西市| 霍城县| 怀集县| 封丘县| 汶川县| 平原县| 张家界市| 罗山县| 呼玛县| 北票市| 扎兰屯市| 石家庄市| 乐业县| 莆田市| 棋牌| 沿河| 汶上县| 新竹县| 双牌县| 南京市| 南川市| 肇源县| 波密县| 陈巴尔虎旗| 谢通门县| 贺兰县| 乌苏市| 永春县| 郸城县| 诸城市| 华安县| 安阳县| 射阳县|