Secure key management policies in strand spaces
From MaRDI portal
Publication:2154015
DOI10.1007/978-3-030-91631-2_10zbMATH Open1498.94060OpenAlexW3214843528MaRDI QIDQ2154015FDOQ2154015
Authors: Riccardo Focardi, Flaminia L. Luccio
Publication date: 13 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-91631-2_10
Recommendations
- A generic security API for symmetric key management on cryptographic devices
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Type-based analysis of PKCS\#11 key management
- Key compromise, strand spaces, and the authentication tests
- Automatic Analysis of the Security of XOR-Based Key Management Schemes
Cites Work
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- Title not available (Why is that?)
- On the security of public key protocols
- State and progress in strand spaces: proving fair exchange
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- On the security of PKCS \#11.
- Formal methods analysis of the secure remote password protocol
- Type-based analysis of PKCS\#11 key management
- An introduction to security API analysis
- A provably secure PKCS\#11 configuration without authenticated attributes
Cited In (1)
This page was built for publication: Secure key management policies in strand spaces
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2154015)