TAuth: Verifying timed security protocols
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service...
Saved in:
Main Authors: | LI, Li, SUN, Jun, LIU, Yang, DONG, Jin Song |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4987 https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Verifying parameterized timed security protocols
by: LI, Li, et al.
Published: (2015) -
Adaptive alarm filtering by causal correlation consideration in intrusion detection
by: Lin H.-S., et al.
Published: (2018) -
Service adaptation with probabilistic partial models
by: CHEN, Manman, et al.
Published: (2016) -
A formal specification and verification framework for timed security protocols
by: Li, Li, et al.
Published: (2020) -
A Security and Performance Evaluation of Hash-Based Rfid Protocols
by: Lim, Tong-Lee, et al.
Published: (2008)