Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols

被引:0
|
作者
Georgieva, Lilia [1 ]
机构
[1] Heriot Watt Univ, Dept Math & Comp Sci, Edinburgh, Midlothian, Scotland
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our aim is to develop a general framework for study and automatic analysis of properties of cryptographic protocols in order to establish design guidelines for business applications which would ensure correctness.
引用
收藏
页码:428 / 428
页数:1
相关论文
共 50 条
  • [41] CDRep: Automatic Repair of Cryptographic Misuses in Android Applications
    Ma, Siqi
    Lo, David
    Li, Teng
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 711 - 722
  • [42] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [43] Process algebraic frameworks for the specification and analysis of cryptographic protocols
    Gorrieri, R
    Martinelli, F
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
  • [44] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
    Samanth, Snehal
    Prema, K.V.
    Balachandra, Mamatha
    IEEE Access, 2024, 12 : 183792 - 183808
  • [45] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, D
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54
  • [46] A survey on computationally sound formal analysis of cryptographic protocols
    Lei, Xin-Feng
    Song, Shu-Min
    Liu, Wei-Bing
    Xue, Rui
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
  • [47] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
    Pankova, Alisa
    Laud, Peeter
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
  • [48] Automated analysis of cryptographic protocols using Mur phi
    Mitchell, JC
    Mitchell, M
    Stern, U
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151
  • [49] Decidable analysis of cryptographic protocols with products and modular exponentiation
    Shmatikov, V
    PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 355 - 369
  • [50] Tools for cryptographic protocols analysis: A technical and experimental comparison
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Sisto, Riccardo
    Valenzano, Adriano
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 954 - 961