[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Formal certification of code-based cryptographic proofs

G Barthe, B Grégoire, S Zanella Béguelin - Proceedings of the 36th …, 2009 - dl.acm.org
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of developing techniques that help tame the complexity of their proofs. Game-based …

[图书][B] Computer science handbook

AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …

Man-in-the-middle in tunnelled authentication protocols

N Asokan, V Niemi, K Nyberg - International Workshop on Security …, 2003 - Springer
Deploying a new security protocol is expensive. This encourages system designers to look
for ways of re-using existing infrastructure. When security protocols and components are re …

A temporal blockchain: a formal analysis

R Dennis, G Owenson, B Aziz - 2016 International Conference …, 2016 - ieeexplore.ieee.org
This paper presents a possible solution to a fundamental limitation facing all blockchain-
based systems; scalability. We propose a temporal rolling blockchain which solves the …

An overview of the verification of SET

G Bella, F Massacci, LC Paulson - International Journal of Information …, 2005 - Springer
This paper describes the verification of Secure Electronic Transaction (SET), an e-commerce
protocol by VISA and MasterCard. The main tasks are to comprehend the written …

Design principles for power grid cyber-infrastructure authentication protocols

H Khurana, R Bobba, T Yardley… - 2010 43rd Hawaii …, 2010 - ieeexplore.ieee.org
Recently, there has been an increased focus and a sense of urgency in developing
standards for Power Grid systems centered on the need for interoperability. Given the threat …

A computational interpretation of Dolev–Yao adversaries

J Herzog - Theoretical Computer Science, 2005 - Elsevier
The Dolev–Yao model is a simple and useful framework in which to analyze security
protocols, but it assumes that the adversary is extremely limited. We show that it is possible …

[PDF][PDF] Software engineering for secure software-state of the art: A survey

KR Jayaram, AP Mathur - Department of Computer Science …, 2005 - cerias.purdue.edu
This report contains a survey of the state of the art in software engineering for secure
software. Secure software is defined and techniques used in each phase of the software …

Verifying the SET purchase protocols

G Bella, F Massacci, LC Paulson - Journal of Automated Reasoning, 2006 - Springer
Abstract SET (Secure Electronic Transaction) is a suite of protocols proposed by a
consortium of credit card companies and software corporations to secure e-commerce …