Analysing layered security protocols
<p>Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the ap...
Yazar: | Gibson-Robinson, T |
---|---|
Diğer Yazarlar: | Lowe, G |
Materyal Türü: | Tez |
Dil: | English |
Baskı/Yayın Bilgisi: |
2013
|
Konular: |
Benzer Materyaller
-
Analysing Layered Security Protocols
Yazar:: Gibson−Robinson, T
Baskı/Yayın Bilgisi: (2013) -
Using human interactive security protocols to secure payments
Yazar:: Chen, B
Baskı/Yayın Bilgisi: (2012) -
On the specification and analysis of secure transport layers
Yazar:: Dilloway, C
Baskı/Yayın Bilgisi: (2008) -
Security layer on top of the node operating system to secure active network /
Yazar:: 350098 Satria Mandala, ve diğerleri
Baskı/Yayın Bilgisi: (2007) -
Physical-layer security : from information theory to security engineering /
Yazar:: Bloch, Matthieu, 1981- 539706, ve diğerleri
Baskı/Yayın Bilgisi: (2011)