搜索结果: 1-6 共查到“applied pi calculus”相关记录6条 . 查询时间(0.14 秒)
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
Secure two-party computation in applied pi-calculus: models and verification
formal verification automated security proofs security models
2015/12/24
Secure two-party computation allows two mutually distrusting parties to compute a function
together, without revealing their secret inputs to each other. Traditionally, the security properties
desir...
New abstractions in applied pi-calculus and automated verification of protected executions
trusted computing platform integrity
2014/3/6
Protocols for the protected execution of programs, like those based on a hardware root of trust, will become of fundamental importance for computer security. In parallel to such protocols, there is th...
Simulation based security in the applied pi calculus
security protocols applied pi calculus Needham-Schroeder-Lowe protocol
2009/6/15
We present a symbolic framework for refinement and composition of
security protocols. The framework uses the notion of ideal functionalities. These
are abstract systems which are secure by construct...
CoSP: A general framework for computational soundness proofs– or –The computational soundness of the applied pi-calculus
CoSP computational soundness applied pi-calculus
2009/6/11
We describe CoSP, a general framework for conducting computational soundness proofs of symbolic
models and for embedding these proofs into formal calculi. CoSP considers arbitrary equational
theorie...
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
Zero-Knowledge Applied Pi- Anonymous Attestation Protocol
2008/8/14
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.