Results 201 to 210 of about 1,862,454 (331)

SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC

open access: yesAdvanced Engineering Research, 2012
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
Nadezhda S. Mogilevskaya
doaj  

On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 1997
D. Boneh, R. DeMillo, R. Lipton
semanticscholar   +1 more source

A Practical Attack on a Braid Group Based Cryptographic Protocol [PDF]

open access: bronze, 2005
Alexei Myasnikov   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy