scholarly journals Deciding Knowledge in Security Protocols under (Many More) Equational Theories

Author(s):  
M. Abadi ◽  
V. Cortier
2010 ◽  
Vol 48 (2) ◽  
pp. 219-262 ◽  
Author(s):  
Ştefan Ciobâcă ◽  
Stéphanie Delaune ◽  
Steve Kremer

2006 ◽  
Vol 367 (1-2) ◽  
pp. 2-32 ◽  
Author(s):  
Martín Abadi ◽  
Véronique Cortier

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Segundo Moises Toapanta Toapanta ◽  
Luis Enrique Mafla Gallegos ◽  
Alex Enrique Aranda Alvarado ◽  
Maximo Prado Solis

2015 ◽  
Vol 17 (1) ◽  
pp. 1-45 ◽  
Author(s):  
Rémy Chrétien ◽  
Véronique Cortier ◽  
Stéphanie Delaune

Sign in / Sign up

Export Citation Format

Share Document