Keywords: پروتکل های امنیتی; Security; Authentication; Signature; One-time password; PKI; Financial institution; Bank; Non-repudiation; Key management; Security protocols; Data integrity; Entropy; Consequential evidence
مقالات ISI ترجمه شده پروتکل های امنیتی
مقالات ISI پروتکل های امنیتی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: پروتکل های امنیتی; Frame loss; Roaming network; Security protocols; Throughput; TCP; UDP;
Keywords: پروتکل های امنیتی; Formal methods; Verification; Security protocols; Privacy-type properties; Symbolic model;
Keywords: پروتکل های امنیتی; Assessment; ProVerif; Pseudonym; Formal methods; Security protocols;
Keywords: پروتکل های امنیتی; Security protocols; Design guidelines; Attack detection; Replay attacks; Parallel session attacks; Freshness of messages; Symmetry of messages; Signed messages; Challenge-response handshake
A secure search protocol for low cost passive RFID tags
Keywords: پروتکل های امنیتی; RFID secure search; EPC C1G2 passive tags; Security protocols;
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy
Keywords: پروتکل های امنیتی; RFID systems; Ownership transfer; Multi-owner; Multi-tag; Security protocols
Modeling test cases for security protocols with SecureMDD
Keywords: پروتکل های امنیتی; Model-driven testing; Security protocols; Security tests; Model-driven software development; Unit tests
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
Keywords: پروتکل های امنیتی; RFID systems; Security protocols; Authentication; Privacy
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
Keywords: پروتکل های امنیتی; Single Sign-On; Security protocols; Model-checking; OpenID; SAML SSO; Vulnerability; Model-based security testing
Signal-flow-based analysis of wireless security protocols
Keywords: پروتکل های امنیتی; Security protocols; Wireless; Cost; Linear System; Physical layer; Key exchange
Timed protocol insecurity problem is NP-complete
Keywords: پروتکل های امنیتی; Security protocols; Real-time models; Computational complexity
Cyber security in the Smart Grid: Survey and challenges
Keywords: پروتکل های امنیتی; Smart Grid; Cyber security; Attacks and countermeasures; Cryptography; Security protocols
Formally based semi-automatic implementation of an open security protocol
Keywords: پروتکل های امنیتی; Model-driven-development; Security protocols; Automatic code generation; Spi2Java
A minimum disclosure approach to authentication and privacy in RFID systems
Keywords: پروتکل های امنیتی; RFID systems; Security protocols; Authentication; Privacy;
Analyzing Internet e-mail date-spoofing
Keywords: پروتکل های امنیتی; Spam; E-mail date-spoofing; Sender-spoofing; Security protocols; E-mail header analysis
Vulnerability analysis of RFID protocols for tag ownership transfer
Keywords: پروتکل های امنیتی; Security protocols; Authentication; Ownership transfer; RFID
Provably correct Java implementations of Spi Calculus security protocols specifications
Keywords: پروتکل های امنیتی; Model-based software development; Correctness preserving code generation; Code verification; Formal methods; Security protocols
Runtime verification of cryptographic protocols
Keywords: پروتکل های امنیتی; Security protocols; SSL; Java; Temporal logic; Static verification; Runtime verification; Security automata
An intruder model with message inspection for model checking security protocols
Keywords: پروتکل های امنیتی; Security protocols; Verification; Model checking; Intrusion attacks; Formal analysis
An analysis of conformance issues in implementations of standardized security protocols
Keywords: پروتکل های امنیتی; Standards implementations; Data communications; Security protocols; Standards validation; Performance evaluation
Specifying authentication using signal events in CSP
Keywords: پروتکل های امنیتی; Authentication; Security protocols; CSP; Formal specification; Kerberos
Cryptanalysis of some improved password-authenticated key exchange schemes
Keywords: پروتکل های امنیتی; Password-authenticated key exchange; Security protocols; Cryptanalysis; Replay attacks
Layered security design for mobile ad hoc networks
Keywords: پروتکل های امنیتی; Mobile ad hoc networks; Security; Link and network layers; Authentication; Security protocols
Design of an enhancement for SSL/TLS protocols
Keywords: پروتکل های امنیتی; Security protocols; SSL/TLS; Session management; Session sharing; Client-side caching
Believing the Integrity of a System
Keywords: پروتکل های امنیتی; Security; Integrity; Security Protocols; Belief logics; System Configuration;
Security protocols analysis: A SDL-based approach
Keywords: پروتکل های امنیتی; Security protocols; Formal analysis; MSC; SDL;
A Syntactic Criterion for Injectivity of Authentication Protocols
Keywords: پروتکل های امنیتی; Security Protocols; Injectivity; Authentication; Synchronization;
Synthesising Efficient and Effective Security Protocols
Keywords: پروتکل های امنیتی; Security Protocols; Belief Logic; Automated Protocol Synthesis; Meta-heuristic Search; Non-functional Requirements;
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
Keywords: پروتکل های امنیتی; Security Protocols; Bounded Model Checking; SAT; Rewriting;
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
Keywords: پروتکل های امنیتی; Security protocols; verification; specification languages; process algebras;
Rule-based Programs Describing Internet Security Protocols
Keywords: پروتکل های امنیتی; Security protocols; verification; specification; rule-based program; compilation;
Deconstructing Alice and Bob
Keywords: پروتکل های امنیتی; Security protocols; protocol models; Alice and Bob notation; control flow; message forwarding; protocol abortion;
A Quantitative Study of Two Attacks
Keywords: پروتکل های امنیتی; Formal methods; performance evaluation; process algebras; security protocols;
Metareasoning about Security Protocols using Distributed Temporal Logic
Keywords: پروتکل های امنیتی; Security protocols; protocol models; intruder models; distributed temporal logic; secrecy; authentication; metareasoning;
Toward Reasoning about Security Protocols: A Semantic Approach
Keywords: پروتکل های امنیتی; modal logic; belief revision; semantic updates; security protocols; dynamic epistemic logic;
A Coordination-based Methodology for Security Protocol Verification
Keywords: پروتکل های امنیتی; Formal methods; formal certification; security protocols; open systems; symbolic model checking;
Computer-assisted verification of a protocol for certified email
Keywords: پروتکل های امنیتی; Security protocols; Protocol formal analysis;
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols
Keywords: پروتکل های امنیتی; Rewriting logic; narrowing; reachability; security protocols;