Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
We consider the so called "cryptographic protocols" whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the protocol itself may have weaknesses which can be exploited by an attacker. We survey recent work on decision techniques for the cryptographic protocol analysis.
Rocznik
Tom
Strony
5--15
Opis fizyczny
Bibliogr. 54 poz.
Twórcy
autor
autor
- LSV/ Ecole Normale Superieure de Cachan & CNRS UMR, Cachan Cedex, France, comon@lsv.ens-cachan.fr
Bibliografia
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPS2-0018-0089