banner ielettronica
 
Anni Universitari


Tutte le Categorie
    

 

 

 

 

 
     

 

 

 



 

Models for Cryptographic Protocol Analysis


Formal models for security protocols often rely on assumptions not to be found in computational models. A first assumption is the perfect encryption one: encrypted data can not be manipulated in any way unless the decryption key is known. Another usual assumption is the free algebra one: only a few cryptographic primitives are considered in the model, and these must form a free algebra. We study these assumptions, and relax them to define more general models. We then define static analysis te ...


Esprimi il tuo voto all'argomento cliccando su una delle stelle:
    Voto Medio:80%   Votanti:50
Data inserimento: 13/08/2007
Data Ultima Modifica: 12/02/2013
Numero di visite: 399

Categorie in cui l'argomento e' contenuto:

TESI INGLESI


Autore: 

Roberto Zunino

Università: 

Università di Pisa

 

Formal models for security protocols often rely on assumptions not to be found in computational models. A first assumption is the perfect encryption one: encrypted data can not be manipulated in any way unless the decryption key is known. Another usual assumption is the free algebra one: only a few cryptographic primitives are considered in the model, and these must form a free algebra. We study these assumptions, and relax them to define more general models. We then define static analysis techniques for veryfing protocols secure in our models.

 




 

 
 

Argomenti correlati:

Altri argomenti:

Altri argomenti:

 
   
   
 

 

 

Ritorna alla pagina precedente

Accesso personalizzato
      >Login
      > Password
 

Le Categorie più ricche

   
descrizione