spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Publications arrow All Publications

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications


Models for Cryptographic Protocol Analysis


@PHDTHESIS{Zun:2006:PHD,
  title = {{Models for Cryptographic Protocol Analysis}},
  author = {{Roberto} {Zunino}},
  abstract = {Formal models for security protocols often rely on assumptions not to be found in computational models. A first assumption is the perfect encryption one: encrypted data can not be manipulated in any way unless the decryption key is known. Another usual assumption is the free algebra one: only a few cryptographic primitives are considered in the model, and these must form a free algebra. We study these assumptions, and relax them to define more general models. We then define static analysis techniques for veryfing protocols secure in our models.},
  publisher = {Technical report},
  year = {2006},
  url = {http://rap.dsi.unifi.it/sensoriasite/phdZunino.pdf},
  partner = {PISA},
  school = {Italy, Ph.D. school in Computer Science, Pisa, University of Pisa},
  status = {public},
  task = {T3.1},
}

spacer

The Sensoria Project Website
2005 - 2010
spacer