Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols

被引:0
|
作者
Georgieva, Lilia [1 ]
机构
[1] Heriot Watt Univ, Dept Math & Comp Sci, Edinburgh, Midlothian, Scotland
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our aim is to develop a general framework for study and automatic analysis of properties of cryptographic protocols in order to establish design guidelines for business applications which would ensure correctness.
引用
收藏
页码:428 / 428
页数:1
相关论文
共 50 条
  • [1] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [2] Automatic verification of cryptographic protocols through compositional analysis techniques
    Marchignoli, D
    Martinelli, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162
  • [3] Experimental comparison of automatic tools for the formal analysis of cryptographic protocols
    Cheminod, M.
    Bertolotti, I. Cibrario
    Durante, L.
    Sisto, R.
    Valenzano, A.
    DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 153 - +
  • [4] Automatic approximation for the verification of cryptographic protocols
    Oehl, F
    Cece, G
    Kouchnarenko, O
    Sinclair, D
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
  • [5] Automatic verification of cryptographic protocols with SETHEO
    Schumann, J
    AUTOMATED DEDUCTION - CADE-14, 1997, 1249 : 87 - 100
  • [6] Prudent engineering practice for cryptographic protocols
    Abadi, M
    Needham, R
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) : 6 - 15
  • [7] Automatic verification of time sensitive cryptographic protocols
    Delzanno, G
    Ganty, P
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356
  • [8] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [9] Protocol engineering principles for cryptographic protocols design
    Dong, Ling
    Chen, Kefei
    Wen, Mi
    Zheng, Yanfei
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 641 - +
  • [10] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5