Automating cryptographic protocol language generation from structured specifications
R Metere, L Arnaboldi - Proceedings of the IEEE/ACM 10th International …, 2022 - dl.acm.org
Security of cryptographic protocols can be analysed by creating a model in a formal
language and verifying the model in a tool. All such tools focus on the last part of the
analysis, verification, and the interpretation of the specification is only explained in papers.
Rather, we focus on the interpretation and modelling part by presenting a tool to aid the
cryptographer throughout the process and automatically generating code in a target
language. We adopt a data-centric approach where the protocol design is stored in a …
language and verifying the model in a tool. All such tools focus on the last part of the
analysis, verification, and the interpretation of the specification is only explained in papers.
Rather, we focus on the interpretation and modelling part by presenting a tool to aid the
cryptographer throughout the process and automatically generating code in a target
language. We adopt a data-centric approach where the protocol design is stored in a …
Automating Cryptographic Protocol Language Generation from Structured Specifications
L Arnaboldi, R Metere - 2022 - research.birmingham.ac.uk
Security of cryptographic protocols can be analysed by creating a model in a formal
language and verifying the model in a tool. All such tools focus on the last part of the
analysis, verification, and the interpretation of the specification is only explained in papers.
Rather, we focus on the interpretation and modelling part by presenting a tool to aid the
cryptographer throughout the process and automatically generating code in a target
language. We adopt a data-centric approach where the protocol design is stored in a …
language and verifying the model in a tool. All such tools focus on the last part of the
analysis, verification, and the interpretation of the specification is only explained in papers.
Rather, we focus on the interpretation and modelling part by presenting a tool to aid the
cryptographer throughout the process and automatically generating code in a target
language. We adopt a data-centric approach where the protocol design is stored in a …
顯示最佳搜尋結果。 查看所有結果