Formal Models and Techniques for Analyzing Security Protocols

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Cortier, Véronique, Kremer, Steve
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: IOS Press 2013
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/35999
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-35999
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-359992014-01-19T23:18:15Z Formal Models and Techniques for Analyzing Security Protocols Cortier, Véronique Kremer, Steve Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the provision of security and prevention of attack have been applied to numerous protocols, including industrial protocols. Models have been extended with algebraic properties to weaken the perfect cryptography assumption and even computational soundness results towards cryptographic models have been achieved. What was still missing, however, was a book which summarized the state-of-the-art of these advances. Whilst this book does not pretend to give a complete overview of the field - something which would be impossible in a single volume - it does, nevertheless, cover a representative sample of the ongoing work in this field, which is still very active. The book contains an introduction and ten tutorial-like chapters on selected topics, each written by a leading expert, and will be of interest to all those involved in the formal analysis of security protocols. 2013-12-18T09:11:42Z 2013-12-18T09:11:42Z 2011 Book 978-1-60750-714-7 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/35999 en application/pdf IOS Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the provision of security and prevention of attack have been applied to numerous protocols, including industrial protocols. Models have been extended with algebraic properties to weaken the perfect cryptography assumption and even computational soundness results towards cryptographic models have been achieved. What was still missing, however, was a book which summarized the state-of-the-art of these advances. Whilst this book does not pretend to give a complete overview of the field - something which would be impossible in a single volume - it does, nevertheless, cover a representative sample of the ongoing work in this field, which is still very active. The book contains an introduction and ten tutorial-like chapters on selected topics, each written by a leading expert, and will be of interest to all those involved in the formal analysis of security protocols.
format Book
author Cortier, Véronique
Kremer, Steve
spellingShingle Cortier, Véronique
Kremer, Steve
Formal Models and Techniques for Analyzing Security Protocols
author_facet Cortier, Véronique
Kremer, Steve
author_sort Cortier, Véronique
title Formal Models and Techniques for Analyzing Security Protocols
title_short Formal Models and Techniques for Analyzing Security Protocols
title_full Formal Models and Techniques for Analyzing Security Protocols
title_fullStr Formal Models and Techniques for Analyzing Security Protocols
title_full_unstemmed Formal Models and Techniques for Analyzing Security Protocols
title_sort formal models and techniques for analyzing security protocols
publisher IOS Press
publishDate 2013
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/35999
_version_ 1757673008796794880