On the Security of PKCS #11
From MaRDI portal
Publication:5187968
DOI10.1007/978-3-540-45238-6_32zbMath1274.94053OpenAlexW1514302123MaRDI QIDQ5187968
Publication date: 9 March 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-45238-6_32
Related Items (8)
Secure key management policies in strand spaces ⋮ A generic security API for symmetric key management on cryptographic devices ⋮ Guessing bank PINs by winning a mastermind game ⋮ Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach ⋮ An Introduction to Security API Analysis ⋮ Safely composing security protocols ⋮ A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case ⋮ A Provably Secure PKCS#11 Configuration Without Authenticated Attributes
This page was built for publication: On the Security of PKCS #11