Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data. Each communication should be secured and protected against dishonest users’ activities during its transfer via network links. Cryptograph...
| Published in: | Applied Sciences |
|---|---|
| Main Authors: | Jacek Piątkowski, Sabina Szymoniak |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-11-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/13/23/12668 |
Similar Items
Security protocols analysis including various time parameters
by: Sabina Szymoniak
Published: (2021-04-01)
by: Sabina Szymoniak
Published: (2021-04-01)
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
by: Sabina Szymoniak, et al.
Published: (2021-04-01)
by: Sabina Szymoniak, et al.
Published: (2021-04-01)
A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
by: M. Henzl, et al.
Published: (2016-04-01)
by: M. Henzl, et al.
Published: (2016-04-01)
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
by: Xiaojuan Chen, et al.
Published: (2020-09-01)
by: Xiaojuan Chen, et al.
Published: (2020-09-01)
Defense and Security Mechanisms in the Internet of Things: A Review
by: Sabina Szymoniak, et al.
Published: (2025-01-01)
by: Sabina Szymoniak, et al.
Published: (2025-01-01)
Using TLA+/TLC for modeling and verification of cryptographic protocols
by: Maxim V. Neyzov, et al.
Published: (2024-12-01)
by: Maxim V. Neyzov, et al.
Published: (2024-12-01)
Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust
by: Ashfaq Ahmed, et al.
Published: (2023-01-01)
by: Ashfaq Ahmed, et al.
Published: (2023-01-01)
Is it possible to decide whether a cryptographic protocol is secure or not?
by: Hubert Comon, et al.
Published: (2002-12-01)
by: Hubert Comon, et al.
Published: (2002-12-01)
Key Agreement and Authentication Protocols in the Internet of Things: A Survey
by: Sabina Szymoniak, et al.
Published: (2022-12-01)
by: Sabina Szymoniak, et al.
Published: (2022-12-01)
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things
by: Koen Tange, et al.
Published: (2021-09-01)
by: Koen Tange, et al.
Published: (2021-09-01)
Cryptographic mechanisms for secure interaction of control and measuring devices
by: Alexey Yu. Nesterenko, et al.
Published: (2020-12-01)
by: Alexey Yu. Nesterenko, et al.
Published: (2020-12-01)
Monitoring approach for online security of cryptographic protocol
by: Yu-na ZHU, et al.
Published: (2016-06-01)
by: Yu-na ZHU, et al.
Published: (2016-06-01)
Monitoring approach for online security of cryptographic protocol
by: Yu-na ZHU, et al.
Published: (2016-06-01)
by: Yu-na ZHU, et al.
Published: (2016-06-01)
APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System
by: Jiyoon Kim, et al.
Published: (2023-06-01)
by: Jiyoon Kim, et al.
Published: (2023-06-01)
VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS
by: Nadezhda S. Mogilevskaya, et al.
Published: (2011-11-01)
by: Nadezhda S. Mogilevskaya, et al.
Published: (2011-11-01)
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
by: Daniel Gerbi Duguma, et al.
Published: (2021-12-01)
by: Daniel Gerbi Duguma, et al.
Published: (2021-12-01)
Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif
by: Ilsun You, et al.
Published: (2024-10-01)
by: Ilsun You, et al.
Published: (2024-10-01)
Modeling and Analysis of Secure Ad Hoc Routing Protocol SRP
by: Shicong Zhang, et al.
Published: (2025-01-01)
by: Shicong Zhang, et al.
Published: (2025-01-01)
Verification of authentication protocols for mobile satellite communication systems
by: Reham Abdellatif Abouhogail
Published: (2014-12-01)
by: Reham Abdellatif Abouhogail
Published: (2014-12-01)
Enhanced modified SecOC protocol for secure automotive networks a comprehensive cryptographic framework
by: Amjad Nsour, et al.
Published: (2025-07-01)
by: Amjad Nsour, et al.
Published: (2025-07-01)
Enhancing Security and Privacy in Modern Text-Based Instant Messaging Communications
by: VUKOVIC GRBIC, D., et al.
Published: (2024-05-01)
by: VUKOVIC GRBIC, D., et al.
Published: (2024-05-01)
Research on Optimization of Security Protocol Formal Verification Based on Reinforcement Learning
by: YANG Jinxiang, XIONG Yan, HUANG Wenchao
Published: (2021-12-01)
by: YANG Jinxiang, XIONG Yan, HUANG Wenchao
Published: (2021-12-01)
Determining the Effects of Students’ Family Characteristics on Entrepreneurship Tendency by Multiway Frequency Analysis
by: Sema Ulutürk Akman
Published: (2021-06-01)
by: Sema Ulutürk Akman
Published: (2021-06-01)
Multi-language oriented automatic realization method for cryptographic protocols
by: Xing-hua LI, et al.
Published: (2012-09-01)
by: Xing-hua LI, et al.
Published: (2012-09-01)
Multi-language oriented automatic realization method for cryptographic protocols
by: Xing-hua LI, et al.
Published: (2012-09-01)
by: Xing-hua LI, et al.
Published: (2012-09-01)
cryptographic Primitives: Insertions, Examples and Open Problems
by: Stanislav Olegovich Dordzhiev, et al.
Published: (2014-02-01)
by: Stanislav Olegovich Dordzhiev, et al.
Published: (2014-02-01)
Cryptographic core design security verification and vulnerability detection based on information flow analysis
by: MA Yixin, et al.
Published: (2022-02-01)
by: MA Yixin, et al.
Published: (2022-02-01)
Assessment of threats to the security of the cryptographic authentication mechanisms of the monitor devices of vehicles
by: Victor S. Gorbatov, et al.
Published: (2019-03-01)
by: Victor S. Gorbatov, et al.
Published: (2019-03-01)
Interação genótipo x local x regime alimentar em bovinos nelore por meio de componentes principais de três modos
by: Ingryd Loiola Franco, et al.
Published: (2012-12-01)
by: Ingryd Loiola Franco, et al.
Published: (2012-12-01)
Machine Learning-Assisted Cryptographic Security: A Novel ECC-ANN Framework for MQTT-Based IoT Device Communication
by: Kalimu Karimunda, et al.
Published: (2025-09-01)
by: Kalimu Karimunda, et al.
Published: (2025-09-01)
Timed models of security protocols including delays in the network
by: Sabina Szymoniak, et al.
Published: (2015-09-01)
by: Sabina Szymoniak, et al.
Published: (2015-09-01)
Lessons Learned from the CYK Algorithm for Parsing-based Verification of Hierarchical Plans
by: Simona Ondrčková, et al.
Published: (2023-05-01)
by: Simona Ondrčková, et al.
Published: (2023-05-01)
Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols
by: Qi Wang, et al.
Published: (2023-11-01)
by: Qi Wang, et al.
Published: (2023-11-01)
A Clustering WSN Routing Protocol Based on k-d Tree Algorithm
by: John Anzola, et al.
Published: (2018-09-01)
by: John Anzola, et al.
Published: (2018-09-01)
Multi-level probabilistic computing: application to the multiway number partitioning problems
by: Ki Hyuk Han, et al.
Published: (2025-08-01)
by: Ki Hyuk Han, et al.
Published: (2025-08-01)
Residual as Linear Sum of Matrix Determinants in Multiway Contingency Tables
by: Shusaku Tsumoto, et al.
Published: (2011-10-01)
by: Shusaku Tsumoto, et al.
Published: (2011-10-01)
Method of designing security protocol for remote attestation
by: YU Rong-wei1, et al.
Published: (2008-01-01)
by: YU Rong-wei1, et al.
Published: (2008-01-01)
Method of designing security protocol for remote attestation
by: YU Rong-wei1, et al.
Published: (2008-01-01)
by: YU Rong-wei1, et al.
Published: (2008-01-01)
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
by: Ghazaleh Sarbishaei, et al.
Published: (2024-01-01)
by: Ghazaleh Sarbishaei, et al.
Published: (2024-01-01)
Secure Z-MAC Protocol as a Proposed Solution for Improving Security in WSNs
by: Mona Nasser Almansoori, et al.
Published: (2022-02-01)
by: Mona Nasser Almansoori, et al.
Published: (2022-02-01)
Similar Items
-
Security protocols analysis including various time parameters
by: Sabina Szymoniak
Published: (2021-04-01) -
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
by: Sabina Szymoniak, et al.
Published: (2021-04-01) -
A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
by: M. Henzl, et al.
Published: (2016-04-01) -
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
by: Xiaojuan Chen, et al.
Published: (2020-09-01) -
Defense and Security Mechanisms in the Internet of Things: A Review
by: Sabina Szymoniak, et al.
Published: (2025-01-01)
