Tomas et al., 2018 - Google Patents
Towards formal verification of cyber security standardsTomas et al., 2018
View HTML- Document ID
- 7009969269434734194
- Author
- Tomas K
- Gorm L
- Publication year
- Publication venue
- Труды Института системного программирования РАН
External Links
Snippet
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for …
- 230000000116 mitigating 0 abstract description 32
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7083892B2 (en) | Mobile authentication interoperability of digital certificates | |
| CN106534160B (en) | Identity authentication method and system based on block chain | |
| JP4113274B2 (en) | Authentication apparatus and method | |
| CN101772771B (en) | Method for remote message attestation in a communication system | |
| US10516653B2 (en) | Public key pinning for private networks | |
| KR101739203B1 (en) | Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption | |
| WO2008026086A2 (en) | Attestation of computing platforms | |
| Hernandez-Ardieta et al. | A taxonomy and survey of attacks on digital signatures | |
| US20080165970A1 (en) | runtime mechanism for flexible messaging security protocols | |
| Brandão et al. | Toward Mending Two Nation-Scale Brokered Identification Systems. | |
| Touil et al. | H-rotation: secure storage and retrieval of passphrases on the authentication process | |
| Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
| Maganis et al. | Opaak: using mobile phones to limit anonymous identities online | |
| Mun et al. | A novel secure and efficient hash function with extra padding against rainbow table attacks | |
| Tomas et al. | Towards formal verification of cyber security standards | |
| Diaz et al. | A formal methodology for integral security design and verification of network protocols | |
| CN116743460A (en) | Data exchange isolation method, system, equipment and storage medium for internal and external network | |
| CN108292997B (en) | Authentication control system and method, server device, client device, authentication method, and recording medium | |
| Armando et al. | Model-checking driven security testing of web-based applications | |
| Tsuji et al. | A one-time password authentication method for low spec machines and on internet protocols | |
| Aiash | A formal analysis of authentication protocols for mobile devices in next generation networks | |
| Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
| TWI381696B (en) | Authentication based on asymmetric cryptography utilizing rsa with personalized secret | |
| CN115277240A (en) | Authentication method and device for Internet of things equipment | |
| Hashim et al. | Design a strong scheme to resist phishing attack |