Cargando…
Modeling and verifying security protocols with the applied Pi calculus and ProVerif
This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks.
Autor principal: | Blanchet, Bruno |
---|---|
Lenguaje: | eng |
Publicado: |
Now Publishers
2016
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2762152 |
Ejemplares similares
-
Applied Calculus of Variations for Engineers
por: Komzsik, Louis
Publicado: (2014) -
System-on-chip security: validation and verification
por: Farahmandi, Farimah, et al.
Publicado: (2019) -
An introduction to applied calculus for social and life sciences
por: Nyabadza, F
Publicado: (2017) -
Verified iptables Firewall Analysis and Verification
por: Diekmann, Cornelius, et al.
Publicado: (2018) -
Mathematical modeling and applied calculus
por: Kilty, Joel, et al.
Publicado: (2018)