Protocols, Strands, and Logic最新文献

筛选
英文 中文
Principles of Remote Sattestation 远程认证原理
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_23
P. Syverson
{"title":"Principles of Remote Sattestation","authors":"P. Syverson","doi":"10.1007/978-3-030-91631-2_23","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_23","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran 基于CPSA和Roletran的密码协议分析与编译
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_20
John D. Ramsdell
{"title":"Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran","authors":"John D. Ramsdell","doi":"10.1007/978-3-030-91631-2_20","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_20","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer 使用加密协议形状分析器在TLS 1.3中搜索自拍
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_3
Prajna Bhandary, Edward Zieglar, Charles Nicholas
{"title":"Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer","authors":"Prajna Bhandary, Edward Zieglar, Charles Nicholas","doi":"10.1007/978-3-030-91631-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_3","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125664206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three Branches of Accountability 问责制的三个分支
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_16
S. Mödersheim, Jorge Cuéllar
{"title":"Three Branches of Accountability","authors":"S. Mödersheim, Jorge Cuéllar","doi":"10.1007/978-3-030-91631-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_16","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tutorial-Style Introduction to DY* DY的教程式介绍*
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_4
K. Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, R. Küsters, G. Schmitz, Tim Würtele
{"title":"A Tutorial-Style Introduction to DY*","authors":"K. Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, R. Küsters, G. Schmitz, Tim Würtele","doi":"10.1007/978-3-030-91631-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_4","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adapting Constraint Solving to Automatically Analyze UPI Protocols 基于约束求解的UPI协议自动分析
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_15
S. Malladi, J. Millen
{"title":"Adapting Constraint Solving to Automatically Analyze UPI Protocols","authors":"S. Malladi, J. Millen","doi":"10.1007/978-3-030-91631-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_15","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benign Interaction of Security Domains 安全域的良性交互
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_17
F. Nielson, René Rydhof Hansen, H. R. Nielson
{"title":"Benign Interaction of Security Domains","authors":"F. Nielson, René Rydhof Hansen, H. R. Nielson","doi":"10.1007/978-3-030-91631-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_17","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131519560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Explain Security Protocols to Your Children 如何向孩子解释安全协议
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_6
V. Cortier, Itsaka Rakotonirina
{"title":"How to Explain Security Protocols to Your Children","authors":"V. Cortier, Itsaka Rakotonirina","doi":"10.1007/978-3-030-91631-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_6","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty 验证基于区块链的Bug赏金远程调试协议
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_7
P. Degano, Letterio Galletta, Selene Gerali
{"title":"Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty","authors":"P. Degano, Letterio Galletta, Selene Gerali","doi":"10.1007/978-3-030-91631-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_7","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124813618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Orderings in Security Models 论安全模型中的排序
Protocols, Strands, and Logic Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-91631-2_21
Paul D. Rowe
{"title":"On Orderings in Security Models","authors":"Paul D. Rowe","doi":"10.1007/978-3-030-91631-2_21","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_21","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信