Model checking analysis of needham-schroeder public-key protocol

被引:0
|
作者
Zhang, Yu-Qing [1 ,2 ]
Wang, Lei [2 ]
Xiao, Guo-Zhen [2 ]
Wu, Jian-Ping [1 ]
机构
[1] Network Res. Center, Tsinghua Univ., Beijing 100084, China
[2] Info. Security Inst., Xidian Univ., Xi'an 710071, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 10期
关键词
BAN logic - Cipher algorithms - Cryptographic protocols - Model checking - NS public key protocols - Symbolic model verifier;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1348 / 1352
相关论文
共 50 条
  • [1] AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL
    LOWE, G
    INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 131 - 133
  • [2] Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    Lowe, G
    SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
  • [3] Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
    Meadows, C.A.
    Lecture Notes in Computer Science, 1996, 1146
  • [4] Model Checking of Needham-Schroeder Protocol Using UPPAAL
    Rong, Mei
    Li, Zhonghui
    Zhang, Guangquan
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [5] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +
  • [6] Using backward strategy to the Needham-Schroeder public key protocol verification
    Kurkowski, M
    Mackow, M
    ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 249 - 259
  • [7] Formal analysis of Needham-Schroeder protocol
    Wang, Gui-Lin
    Qing, Si-Han
    Zhou, Zhan-Fei
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (SUPPL.): : 86 - 92
  • [8] Model Checking Needham-Schroeder Security Protocol based on Temporal Logic of Knowledge
    Luo, Xiangyu
    Chen, Yan
    Gu, Ming
    Wu, Lijun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 551 - +
  • [9] Improvement and security analysis on symmetric key authentication protocol Needham-Schroeder
    Liu, Simin
    Ye, Junyao
    Wang, Yinglian
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1289 - 1293
  • [10] Protocol Derivation System for the Needham-Schroeder family
    Zhang, Junwei
    Ma, Jianfeng
    Yang, Chao
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2687 - 2703