+

Tomas et al., 2018 - Google Patents

Towards formal verification of cyber security standards

Tomas et al., 2018

View HTML @Full View
Document ID
7009969269434734194
Author
Tomas K
Gorm L
Publication year
Publication venue
Труды Института системного программирования РАН

External Links

Snippet

Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for …
Continue reading at cyberleninka.ru (HTML) (other versions)

Similar Documents

Publication Publication Date Title
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
CN106534160B (en) Identity authentication method and system based on block chain
JP4113274B2 (en) Authentication apparatus and method
CN101772771B (en) Method for remote message attestation in a communication system
US10516653B2 (en) Public key pinning for private networks
KR101739203B1 (en) Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption
WO2008026086A2 (en) Attestation of computing platforms
Hernandez-Ardieta et al. A taxonomy and survey of attacks on digital signatures
US20080165970A1 (en) runtime mechanism for flexible messaging security protocols
Brandão et al. Toward Mending Two Nation-Scale Brokered Identification Systems.
Touil et al. H-rotation: secure storage and retrieval of passphrases on the authentication process
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
Maganis et al. Opaak: using mobile phones to limit anonymous identities online
Mun et al. A novel secure and efficient hash function with extra padding against rainbow table attacks
Tomas et al. Towards formal verification of cyber security standards
Diaz et al. A formal methodology for integral security design and verification of network protocols
CN116743460A (en) Data exchange isolation method, system, equipment and storage medium for internal and external network
CN108292997B (en) Authentication control system and method, server device, client device, authentication method, and recording medium
Armando et al. Model-checking driven security testing of web-based applications
Tsuji et al. A one-time password authentication method for low spec machines and on internet protocols
Aiash A formal analysis of authentication protocols for mobile devices in next generation networks
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
TWI381696B (en) Authentication based on asymmetric cryptography utilizing rsa with personalized secret
CN115277240A (en) Authentication method and device for Internet of things equipment
Hashim et al. Design a strong scheme to resist phishing attack
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载