Doprava zdarma se Zásilkovnou nad 1 499 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 GLS 54 Kurýr GLS 64 PPL 99 Zásilkovna 54

Automating Security Protocol Analysis

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Automating Security Protocol Analysis Stephen W Mancini
Libristo kód: 08250597
Nakladatelství Biblioscholar, prosince 2012
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took... Celý popis
? points 165 b
1 646
Skladem u dodavatele Odesíláme za 14-18 dnů

30 dní na vrácení zboží


Mohlo by vás také zajímat


Digested Twenty-first Century John Crace / Pevná
common.buy 673
Collecting Food, Cultivating People Kathryn M. De Luna / Pevná
common.buy 962
Devour Us Not Arnold P Powers / Pevná
common.buy 948
Wait a Year.. Harriette Bowra / Brožovaná
common.buy 673
Lila's Child Robert M. Pirsig / Pevná
common.buy 1 200
Cinematic Emotion in Horror Films and Thrillers Julian Hanich / Brožovaná
common.buy 1 945
Minister's Companion Bible: Ephesians Earl Pickett / Brožovaná
common.buy 372
Marsoc Needs Marine Aviation Peter J Epton / Brožovaná
common.buy 1 646
Cockroach Blood Bede Clarke / Brožovaná
common.buy 474
Outdoor Chums Quincy Allen / Brožovaná
common.buy 371

When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took over 18 years to discover that even with the most secure encryption, the conversations using this protocol were still subject to penetration. To date, there is still no one protocol that is accepted for universal use. Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others [9] have identified several properties that good protocols often exhibit. Termed "Authentication Tests", these properties have been very useful in examining protocols. The purpose of this research is to automate these tests and thus help expedite the analysis of both existing and future protocols. The success of this research is shown through rapid analysis of numerous protocols for the existence of authentication tests. The result of this is that an analyst is now able to ascertain in near real-time whether or not a proposed protocol is of a sound design or whether an existing protocol may contain previously unknown weaknesses. The other achievement of this research is the generality of the input process involved. Although there exist other protocol analyzers, their use is limited primarily due to their complexity of use. With the tool generated here, an analyst needs only to enter their protocol into a standard text file; and almost immediately, the analyzer determines the existence of the authentication tests.

Informace o knize

Plný název Automating Security Protocol Analysis
Jazyk Angličtina
Vazba Kniha - Brožovaná
Datum vydání 2012
Počet stran 106
EAN 9781288409600
ISBN 9781288409600
Libristo kód 08250597
Nakladatelství Biblioscholar
Váha 204
Rozměry 189 x 246 x 6
Darujte tuto knihu ještě dnes
Je to snadné
1 Přidejte knihu do košíku a zvolte doručit jako dárek 2 Obratem vám zašleme poukaz 3 Kniha dorazí na adresu obdarovaného

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet