The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (2006)
Chicago, Illinois
Sept. 17, 2006 to Sept. 21, 2006
ISSN: 0730-3157
ISBN: 0-7695-2655-1
pp: 368-369
K R Jayaram , Purdue University, USA
Cryptographic protocols, which are also referred to as security protocols are used to process, store and transfer increasing volumes of information on our financial networks, health networks, and even our library systems, not to mention our conventional communication systems and our networked systems of personal and corporate computers. Users should be able to justifiably rely on their implementations to process, store, and communicate sensitive information securely.
K R Jayaram, "Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations", 2013 IEEE 37th Annual Computer Software and Applications Conference, vol. 02, no. , pp. 368-369, 2006, doi:10.1109/COMPSAC.2006.133
91 ms
(Ver 3.3 (11022016))