Analysis of cryptographic protocols using logics of belief: an overview

When designing a cryptographic protocol or explaining it, one often uses arguments such as ``since this message was signed by machine B, machine A can be sure it came from B`` in informal proofs justifying how the protocol works. Since it is, in such informal proofs, often easy to overlook an essen...

詳細記述

書誌詳細
出版年:Journal of Telecommunications and Information Technology
第一著者: David Monniaux
フォーマット: 論文
言語:英語
出版事項: National Institute of Telecommunications 2002-12-01
主題:
オンライン・アクセス:https://jtit.pl/jtit/article/view/145

類似資料