scholarly journals The TAMARIN Prover for the Symbolic Analysis of Security Protocols

Author(s):  
Simon Meier ◽  
Benedikt Schmidt ◽  
Cas Cremers ◽  
David Basin
2005 ◽  
Vol 338 (1-3) ◽  
pp. 393-425 ◽  
Author(s):  
Michele Boreale ◽  
Maria Grazia Buscemi

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Segundo Moises Toapanta Toapanta ◽  
Luis Enrique Mafla Gallegos ◽  
Alex Enrique Aranda Alvarado ◽  
Maximo Prado Solis

2015 ◽  
Vol 17 (1) ◽  
pp. 1-45 ◽  
Author(s):  
Rémy Chrétien ◽  
Véronique Cortier ◽  
Stéphanie Delaune

2021 ◽  
Vol 13 (4) ◽  
Author(s):  
Rocío Bernal-García ◽  
Felipe Gómez-Moreno ◽  
Francisco J. Serrano ◽  
César Heras ◽  
José Yravedra

Sign in / Sign up

Export Citation Format

Share Document