搜索结果: 1-4 共查到“军队指挥学 cryptographically sound”相关记录4条 . 查询时间(0.093 秒)
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
Cryptographically Sound Security Proof On-Demand Source Routing Protocol EndairA
2011/3/11
We present the first cryptographically sound security proof of a routing
protocol for mobile ad-hoc networks. More precisely, we show that the route
discovery protocol does not output a non-existing...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
cryptographic protocols
2012/3/29
We present the first cryptographically sound security proof of a routing protocol for mobile ad-hoc networks. More precisely, we show that the route discovery protocol does not output a non-existing p...
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
cryptographically sound security proof public-key kerberos
2008/12/2
We present a computational analysis of core Kerberos with
public-key authentication (PKINIT) in which we consider authentication
and key secrecy properties. These proofs rely on the Dolev-Yao
styl...
We describe a faithful embedding of the Dolev-Yao model of Backes,
Pfitzmann, andWaidner (CCS 2003) in the theorem prover Isabelle/HOL. This model
is cryptographically sound in the strong sense of r...