Secure key management policies in strand spaces
From MaRDI portal
Publication:2154015
DOI10.1007/978-3-030-91631-2_10zbMATH Open1498.94060OpenAlexW3214843528MaRDI QIDQ2154015FDOQ2154015
Flaminia L. Luccio, Riccardo Focardi
Publication date: 13 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-91631-2_10
Recommendations
- A generic security API for symmetric key management on cryptographic devices
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Type-based analysis of PKCS\#11 key management
- Key compromise, strand spaces, and the authentication tests
- Automatic Analysis of the Security of XOR-Based Key Management Schemes
Cites Work
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- Title not available (Why is that?)
- On the security of public key protocols
- State and progress in strand spaces: proving fair exchange
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- On the Security of PKCS #11
- Formal methods analysis of the secure remote password protocol
- Type-Based Analysis of PKCS#11 Key Management
- An Introduction to Security API Analysis
- A Provably Secure PKCS#11 Configuration Without Authenticated Attributes
Cited In (1)
This page was built for publication: Secure key management policies in strand spaces
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2154015)