Cargando…
Modeling and verifying security protocols with the applied Pi calculus and ProVerif
This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks.
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Now Publishers
2016
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2762152 |
_version_ | 1780970651477082112 |
---|---|
author | Blanchet, Bruno |
author_facet | Blanchet, Bruno |
author_sort | Blanchet, Bruno |
collection | CERN |
description | This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks. |
id | cern-2762152 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2016 |
publisher | Now Publishers |
record_format | invenio |
spelling | cern-27621522021-04-21T16:39:15Zhttp://cds.cern.ch/record/2762152engBlanchet, BrunoModeling and verifying security protocols with the applied Pi calculus and ProVerifXXThis survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks.Now Publishersoai:cds.cern.ch:27621522016 |
spellingShingle | XX Blanchet, Bruno Modeling and verifying security protocols with the applied Pi calculus and ProVerif |
title | Modeling and verifying security protocols with the applied Pi calculus and ProVerif |
title_full | Modeling and verifying security protocols with the applied Pi calculus and ProVerif |
title_fullStr | Modeling and verifying security protocols with the applied Pi calculus and ProVerif |
title_full_unstemmed | Modeling and verifying security protocols with the applied Pi calculus and ProVerif |
title_short | Modeling and verifying security protocols with the applied Pi calculus and ProVerif |
title_sort | modeling and verifying security protocols with the applied pi calculus and proverif |
topic | XX |
url | http://cds.cern.ch/record/2762152 |
work_keys_str_mv | AT blanchetbruno modelingandverifyingsecurityprotocolswiththeappliedpicalculusandproverif |