Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience.
Pierre CorbineauMathilde DuclosYassine LakhnechPublished in: CPP (2011)
Keyphrases
- computational model
- cryptographic protocols
- security properties
- intrusion detection
- standard model
- encryption decryption
- computational models
- network security
- computational framework
- cognitive modeling
- security protocols
- language acquisition
- intrusion detection system
- authentication protocol
- cognitive architecture
- insider attacks
- intrusion detection and prevention
- computational modeling
- low cost
- working memory
- security policies
- network traffic