У нас вы можете посмотреть бесплатно Security Protocols and Their Correctness или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
The recording is of a Cambridge Computer Laboratory "Wednesday seminar" given early in 1998. I gave essentially the same talk at the Automated Reasoning Workshop in St. Andrews, Scotland (March 1998). Many thanks to Dr David Greaves for editing, inserting the slides and adding subtitles. Here is the original abstract: "Security protocols are used in the Internet, mobile phones, digital payment systems, etc. Their goals may be to keep data secret, to preserve it from tampering, or to prevent intruders from assuming somebody else's name. A faulty protocol can be attacked by simple means, such as replaying parts of old sessions, without brute-force codebreaking. Researchers have developed tools to search for such attacks. However, failure to find attacks does not mean that a protocol is correct. Protocols and their goals are seldom specified formally, which makes it hard to say whether they are correct, even when possible attacks are pointed out. The speaker will outline recent approaches to showing correctness, taking as an example a simple public-key protocol."