Skip navigation
Skip navigation
The system will be down for maintenance between 8:00 and 8:15am on Wednesday 12, December 2018

Runtime verification of cryptographic protocols

Bauer, Andreas; Juerjens, Jan

Description

There has been a significant amount of work devoted to the static verification of security protocol designs. Virtually all of these results, when applied to an actual implementation of a security protocol, rely on certain implicit assumptions on the implementation (for example, that the cryptographic checks that according to the design have to be performed by the protocol participants are carried out correctly). So far there seems to be no approach that would enforce these implicit assumptions...[Show more]

CollectionsANU Research Publications
Date published: 2010
Type: Journal article
URI: http://hdl.handle.net/1885/56955
Source: Computers and Security
DOI: 10.1016/j.cose.2009.09.003

Download

File Description SizeFormat Image
01_Bauer_Runtime_verification_of_2010.pdf194.7 kBAdobe PDF    Request a copy
02_Bauer_Runtime_verification_of_2010.pdf1.22 MBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  27 November 2018/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator