Model checking analysis of needham-schroeder public-key protocol

被引:0
|
作者
Zhang, Yu-Qing [1 ,2 ]
Wang, Lei [2 ]
Xiao, Guo-Zhen [2 ]
Wu, Jian-Ping [1 ]
机构
[1] Network Res. Center, Tsinghua Univ., Beijing 100084, China
[2] Info. Security Inst., Xidian Univ., Xi'an 710071, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 10期
关键词
BAN logic - Cipher algorithms - Cryptographic protocols - Model checking - NS public key protocols - Symbolic model verifier;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1348 / 1352
相关论文
共 50 条
  • [31] Interactive identification protocol based on a quantum public-key cryptosystem
    Wu, Chenmiao
    Yang, Li
    QUANTUM AND NONLINEAR OPTICS III, 2014, 9269
  • [32] A public-key based authentication and key establishment protocol coupled with a client puzzle
    Lee, MC
    Fung, CK
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (09): : 810 - 823
  • [33] Performance evaluation of public-key cryptosystem operations in WTLS protocol
    Levi, A
    Savas, E
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1245 - 1250
  • [34] An improved way on Kerberos protocol based on public-key algorithms
    Liu, K.
    Qing, S.
    Meng, Y.
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (06): : 872 - 877
  • [35] Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol
    Jeon, Seok Hee
    Gil, Sang Keun
    CURRENT OPTICS AND PHOTONICS, 2020, 4 (02) : 103 - 114
  • [36] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [37] New security protocol for mobile agent based on public-key infrastructure
    Mazlan, MA
    Dibba, M
    Samsudin, A
    Kamarulhali, H
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 96 - 101
  • [38] A new notion of soundness in bare public-key model
    ZHAO Yunlei 1
    2. Department of Computer Science
    ProgressinNaturalScience, 2003, (12) : 47 - 51
  • [39] A new notion of soundness in bare public-key model
    Cheung, SHC
    Deng, XT
    Lee, CH
    Zhao, YL
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 318 - 325
  • [40] Quantum public-key encryption protocol based on single-photon
    Luo, Wen-Jun
    Liu, Guan-Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 9 - 13