Dolev-Yao model

Results: 12



#Item
1

ARA SSIA FormaCryptTwo models for the verification of cryptographic protocols: computational model formal, “Dolev-Yao” model enc(M,k

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:48
    2Failure / Cross-site scripting / Vulnerability / SQL injection / Fault injection / Dolev-Yao model / Model-based testing / Remote file inclusion / Code injection / Software testing / Cyberwarfare / Computer security

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2012-10-11 06:26:07
    3Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

    ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

    Add to Reading List

    Source URL: www.irisa.fr

    Language: English - Date: 2003-12-17 02:53:50
    4Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

    Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2007-12-18 00:37:13
    5Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing

    Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨

    Add to Reading List

    Source URL: www.isse.uni-augsburg.de

    Language: English - Date: 2014-12-01 09:19:17
    6Information / Dolev-Yao model / Public-key cryptography / Communications protocol / Needham–Schroeder protocol / Transmission Control Protocol / Smart card / Email / Cryptographic protocols / Cryptography / Data

    ¨t Augsburg Universita Verifying Smart Card Applications: An ASM Approach. D.Haneberg, H.Grandy, W.Reif, G.Schellhorn

    Add to Reading List

    Source URL: www.isse.uni-augsburg.de

    Language: English - Date: 2014-12-01 09:19:28
    7Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

    NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

    Add to Reading List

    Source URL: www.nrl.navy.mil

    Language: English - Date: 2013-04-26 15:14:05
    8Computer security / Dolev-Yao model / RSA / Adversary model / Cryptography / Cryptographic protocols / Public-key cryptography

    NRL Release Number[removed]Dolev-Yao is no better than Machiavelli Paul Syverson, Catherine Meadows Center for High Assurance Computer Systems

    Add to Reading List

    Source URL: www.nrl.navy.mil

    Language: English - Date: 2013-04-29 11:52:34
    9Dolev-Yao model / Communications protocol / Computer security / Cryptographic primitive / Information-theoretic security / Cryptography / Cryptographic protocols / Secure multi-party computation

    ZISC annual report[removed]

    Add to Reading List

    Source URL: www.zisc.ethz.ch

    Language: English - Date: 2015-02-14 14:43:29
    10Computing / Cryptography / Communications protocol / Adversary model / Cryptographic nonce / Turing machine / Memory / Bounded set / Cryptographic protocols / Data / Information

    Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

    Add to Reading List

    Source URL: bib.irb.hr

    Language: English - Date: 2014-08-21 13:21:17
    UPDATE