透過您的圖書館登入
IP:18.188.146.77

並列摘要


In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly generate security protocols as a method of introducing heterogeneity. We present the results of simulations for the case of two party authentication protocols and argue that choosing protocols randomly out of sets numbering in the hundreds of millions is practical and achievable with an acceptable overhead. To realize the simulation, we implemented a highly efficient protocol verifier, achieving approximately two orders of magnitude improvement in performance compared to previous work.

被引用紀錄


Chen, P. Y. (2016). 運用最佳化技術決定多階段網路攻防情境中之防禦資源分配策略以優化系統之存活度 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU201610075
Shih, I. J. (2012). 考量不完全資訊情況下多階段防禦資源分配以及防禦訊息策略選擇演算法以最大化網路存活度 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2012.01348

延伸閱讀