30th Annual International Computer Software and Applications Conference (COMPSAC'06) (2006)
Sept. 17, 2006 to Sept. 21, 2006
K R Jayaram , Purdue University, USA
Cryptographic protocols, which are also referred to as security protocols are used to process, store and transfer increasing volumes of information on our financial networks, health networks, and even our library systems, not to mention our conventional communication systems and our networked systems of personal and corporate computers. Users should be able to justifiably rely on their implementations to process, store, and communicate sensitive information securely.
K. R. Jayaram, "Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations," 30th Annual International Computer Software and Applications Conference (COMPSAC'06 Supplement)(COMPSAC), Chicago, Illinois, 2006, pp. 368-369.