Analysing layered security protocols
<p>Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the ap...
第一著者: | Gibson-Robinson, T |
---|---|
その他の著者: | Lowe, G |
フォーマット: | 学位論文 |
言語: | English |
出版事項: |
2013
|
主題: |
類似資料
-
Analysing Layered Security Protocols
著者:: Gibson−Robinson, T
出版事項: (2013) -
Using human interactive security protocols to secure payments
著者:: Chen, B
出版事項: (2012) -
On the specification and analysis of secure transport layers
著者:: Dilloway, C
出版事項: (2008) -
Security layer on top of the node operating system to secure active network /
著者:: 350098 Satria Mandala, 等
出版事項: (2007) -
Physical-layer security : from information theory to security engineering /
著者:: Bloch, Matthieu, 1981- 539706, 等
出版事項: (2011)