Efficient verification of security protocols using partial-order reductions

Author(s):  
Edmund Clarke ◽  
Somesh Jha ◽  
Will Marrero
2008 ◽  
Vol 198 (1) ◽  
pp. 93-99 ◽  
Author(s):  
M. Torabi Dashti ◽  
A. Wijs ◽  
B. Lisser

Author(s):  
Manas Kumar Yogi ◽  
◽  
L. Yamuna ◽  
P. Surayanka ◽  
◽  
...  

2019 ◽  
Vol 7 (1) ◽  
pp. 424-430
Author(s):  
A. George Louis Raja ◽  
F. Sagayaraj Francis ◽  
P. Sugumar
Keyword(s):  

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


2019 ◽  
Vol 12 (4) ◽  
Author(s):  
Ye-Chao Liu ◽  
Xiao-Dong Yu ◽  
Jiangwei Shang ◽  
Huangjun Zhu ◽  
Xiangdong Zhang

Sign in / Sign up

Export Citation Format

Share Document