Model checking analysis of needham-schroeder public-key protocol

被引:0
|
作者
Zhang, Yu-Qing [1 ,2 ]
Wang, Lei [2 ]
Xiao, Guo-Zhen [2 ]
Wu, Jian-Ping [1 ]
机构
[1] Network Res. Center, Tsinghua Univ., Beijing 100084, China
[2] Info. Security Inst., Xidian Univ., Xi'an 710071, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 10期
关键词
BAN logic - Cipher algorithms - Cryptographic protocols - Model checking - NS public key protocols - Symbolic model verifier;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1348 / 1352
相关论文
共 50 条
  • [21] Efficient Public-Key Distance Bounding Protocol
    Kilinc, Handan
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 873 - 901
  • [22] A public-key protocol for social networks with private relationships
    Domingo-Ferrer, Josep
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4617 : 373 - 379
  • [23] A client puzzle based public-key authentication protocol
    Fung, CK
    Lee, MC
    Wong, MY
    SMART NETWORKS, 2002, 84 : 263 - 277
  • [24] Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol
    Rodríguez-Henríquez, F
    López-Peza, CE
    León-Chávez, MA
    2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 124 - 129
  • [25] A model for revocation forecasting in public-key infrastructures
    Ganan, Carlos
    Mata-Diaz, Jorge
    Munoz, Jose L.
    Esparza, Oscar
    Alins, Juanjo
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 43 (02) : 311 - 331
  • [26] A Practical Quantum Public-key Encryption Model
    Wang, Yuqi
    She, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 367 - 372
  • [27] Concurrent Knowledge Extraction in the Public-Key Model
    Yao, Andrew C.
    Yung, Moti
    Zhao, Yunlei
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT I, 2010, 6198 : 702 - +
  • [28] A model for revocation forecasting in public-key infrastructures
    Carlos Gañán
    Jorge Mata-Díaz
    Jose L. Muñoz
    Oscar Esparza
    Juanjo Alins
    Knowledge and Information Systems, 2015, 43 : 311 - 331
  • [29] A denial-of-service resistant public-key authentication and key establishment protocol
    Fung, CK
    Lee, MC
    CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178
  • [30] Concurrent zero knowledge in the public-key model
    Di Crescenzo, G
    Visconti, I
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 816 - 827