Cryptographic protocol
둘러보기로 가기
검색하러 가기
노트
- For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTPS) connections.[1]
- Cryptographic protocols can sometimes be verified formally on an abstract level.[1]
- The security of widely used cryptographic protocols is based on the conjectured difficulty of the factorization of large integers.[2]
- Cryptographic protocols are widely used for secure application-level data transport, in order to secure transferred messages.[3]
- The term cryptographic protocol is used in different ways.[3]
- This chapter gives a brief introduction of cryptographic protocols and the reason why we study these protocols.[4]
- A cryptographic protocol is designed to allow secure communication under a given set of circumstances.[5]
- We apply reachability analysis over term rewriting systems to the verification of cryptographic protocols.[6]
- Verification of copy-protection cryptographic protocol using approximations of term rewriting systems.[6]
- Cryptographic protocols and algorithms are difficult to get right, so do not create your own.[7]
- Quantum systems provide a level of security far exceeding that of any cryptographic protocol currently known, experts say.[8]
- Designing new types of IoT-compatible cryptographic protocols has become a more popular way to secure IoT-based applications.[9]
- Significant attention has been dedicated to the challenge of implementing a lightweight and secure cryptographic protocol for IoT devices.[9]
- In this study, we propose a lightweight cryptographic protocol integrating certificateless signature and bilinear pairing crypto-primitives.[9]
- Rigorous security analyses are conducted to guarantee the robustness of the proposed cryptographic protocol.[9]
- At the heart of the security of any system using network interaction are cryptographic protocols.[10]
- Thus, verification of the cryptographic protocol of the electronic voting system using source codes is relevant.[10]
- A parser is described to extract the structure of the cryptographic protocol with which the structure of the voting protocol was obtained.[10]
- In particular, TLS and IPsec are covered, as well as security protocols in WiFi networks.[11]
- Designing a cryptographic protocol correctly is a hard task, and even cryptographic standard may be flawed.[12]
- By nature, cryptographic protocols are at the heart of the products that make use of them.[12]
- Are you building an innovative product that requires a secure cryptographic protocol but lack the required expertise?[12]
- We can design the custom cryptographic protocol that best suits your requirements.[12]
- This post discusses how to secure state-of-the-art cryptographic protocols against attacks from (future) quantum computers.[13]
- Recognize the need for techniques for the verification and analysis of security protocols.[14]
- People have found serious security flaws in major cryptographic protocols.[15]
- In recent years, people use formal methods to guarantee the correctness of cryptographic protocols in a strong sense.[15]
- In this paper, we propose to prove the correctness of cryptographic protocols based on the extension rule.[15]
- We show that this is an effective technique, which can help to find the security flaws in major cryptographic protocols.[15]
- TLS and IKE are some examples of well-known cryptographic protocols.[16]
- CPSA attempts to enumerate all essentially different executions possible for a cryptographic protocol.[16]
- Like GSM before it, LTE has a standard set of cryptographic protocols for encrypting packets while they travel over the air.[17]
소스
- ↑ 이동: 1.0 1.1 Cryptographic protocol
- ↑ Cryptographic Protocol - an overview
- ↑ 이동: 3.0 3.1 Simple English Wikipedia, the free encyclopedia
- ↑ Introduction of Cryptographic Protocols
- ↑ What is a “Cryptographic Protocol?”
- ↑ 이동: 6.0 6.1 Cryptographic protocols
- ↑ Cryptographic Algorithms and Protocols
- ↑ Cryptographic protocol
- ↑ 이동: 9.0 9.1 9.2 9.3 A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things
- ↑ 이동: 10.0 10.1 10.2 Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries
- ↑ Cryptographic protocols
- ↑ 이동: 12.0 12.1 12.2 12.3 Cryptographic Protocols
- ↑ Quantum Hardening Cryptographic Protocols
- ↑ No title
- ↑ 이동: 15.0 15.1 15.2 15.3 Cryptographic Protocol Verification Based on the Extension Rule
- ↑ 이동: 16.0 16.1 mitre/cpsa: Cryptographic Protocol Shapes Analyzer
- ↑ protocols – A Few Thoughts on Cryptographic Engineering
메타데이터
위키데이터
- ID : Q1254335
Spacy 패턴 목록
- [{'LOWER': 'cryptographic'}, {'LEMMA': 'protocol'}]
- [{'LOWER': 'security'}, {'LEMMA': 'protocol'}]
- [{'LOWER': 'encryption'}, {'LEMMA': 'protocol'}]
- [{'LEMMA': 'protocol'}]