Standards for cryptographic protocols have long been attractive candidates for formal verification. It is important that such standards be correct, and cryptographic protocols are tricky to design and subject to non-intuitive attacks even when the underlying cryptosystems are secure. Thus a number of general-purpose cryptographic protocol analysis tools have been developed and applied to protocol standards. However, there is one class of standards, security application programming interfaces (security APIs), to which few of these tools have been applied. Instead, most work has concentrated on developing special-purpose tools and algorithms for specific classes of security APIs. However, there can be much advantage gained from havi...
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti...
The verification of systems for protecting sensitive and confidential information is becoming an inc...
Content syndication specifications such as Atom have become a popular mechanism to disseminate infor...
[EN] Maude-NPA is an analysis tool for cryptographic security protocols that takes into account the ...
Agent-based electronic commerce is known to offer many advantages to users. However, very few studie...
Security is a crucial requirement in the applications based on information and communication technol...
[EN] Despite the intense efforts to prevent programmers from writing code with memory errors, memory...
[EN] Due to the increase in collaborative work and the decentralization of processes in many domain...
[EN] Cybersecurity is known as the practice of protecting systems from digital attacks. Organization...
Many cryptographic techniques have been developed and several were broken. Recently, new models have...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at s...
Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifi...
[EN] To maintain integrity, constraint violations should be prevented or repaired. However, it may n...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Provable security is a fundamental concept of modern cryptography (see, e.g., Katz and Lindell; Int...
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti...
The verification of systems for protecting sensitive and confidential information is becoming an inc...
Content syndication specifications such as Atom have become a popular mechanism to disseminate infor...
[EN] Maude-NPA is an analysis tool for cryptographic security protocols that takes into account the ...
Agent-based electronic commerce is known to offer many advantages to users. However, very few studie...
Security is a crucial requirement in the applications based on information and communication technol...
[EN] Despite the intense efforts to prevent programmers from writing code with memory errors, memory...
[EN] Due to the increase in collaborative work and the decentralization of processes in many domain...
[EN] Cybersecurity is known as the practice of protecting systems from digital attacks. Organization...
Many cryptographic techniques have been developed and several were broken. Recently, new models have...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at s...
Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifi...
[EN] To maintain integrity, constraint violations should be prevented or repaired. However, it may n...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Provable security is a fundamental concept of modern cryptography (see, e.g., Katz and Lindell; Int...
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti...
The verification of systems for protecting sensitive and confidential information is becoming an inc...
Content syndication specifications such as Atom have become a popular mechanism to disseminate infor...