Cargando…

Formal models and techniques for analyzing security protocols /

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: IOS Press
Otros Autores: Cortier, Véronique, Kremer, Steve
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Da Washington, DC : IOS Press, ©2011.
Colección:Cryptology and information security series ; v. 5.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness
  • The Case of Diffie-Hellman Keys; Author Index.