Skip navigation
Skip navigation
Open Research will be down for maintenance between 8:00 and 8:15 am on Tuesday, December 1 2020.

Runtime verification of cryptographic protocols

Bauer, Andreas; Juerjens, Jan


There has been a significant amount of work devoted to the static verification of security protocol designs. Virtually all of these results, when applied to an actual implementation of a security protocol, rely on certain implicit assumptions on the implementation (for example, that the cryptographic checks that according to the design have to be performed by the protocol participants are carried out correctly). So far there seems to be no approach that would enforce these implicit assumptions...[Show more]

CollectionsANU Research Publications
Date published: 2010
Type: Journal article
Source: Computers and Security
DOI: 10.1016/j.cose.2009.09.003


File Description SizeFormat Image
01_Bauer_Runtime_verification_of_2010.pdf194.7 kBAdobe PDF    Request a copy
02_Bauer_Runtime_verification_of_2010.pdf1.22 MBAdobe PDF    Request a copy

Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  19 May 2020/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator