Cryptographic protocol logic for analyzing a variety of security properties and its formal semantics

被引:0
|
作者
Chen, Li [1 ]
Li, Xiangdong [2 ]
机构
[1] Henan University of Economics and Law, China
[2] School of Computer Science, Zhongyuan University of Technology, China
关键词
D O I
10.4156/ijact.vol4.issue11.30
中图分类号
学科分类号
摘要
引用
收藏
页码:283 / 293
相关论文
共 20 条
  • [1] A logic for analyzing time-dependent cryptographic protocol
    Lei Xinfeng
    Xiao Junmo
    Liu Jun
    Wang Yanbo
    ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 853 - 858
  • [2] Logic analysis of the cryptographic protocol and its improvements
    Shi, Shudong
    Li, Zhitang
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (07): : 4 - 6
  • [3] Formal verification method for cryptographic software security based on Hoare logic
    Xiao K.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (04): : 1301 - 1306
  • [4] A formal system for analysis of cryptographic encryption and their security properties
    Hagihara, F
    Hagihara, S
    Yonezaki, N
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 87 - 112
  • [5] Formal analysis of cryptographic protocol based on intruders algorithmic knowledge logic
    Xiao, MH
    Xue, JY
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 530 - 533
  • [6] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [7] Probabilistic polynomial-time semantics for a protocol security logic
    Datta, A
    Derek, A
    Mitchell, JC
    Shmatikov, V
    Turuani, M
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 16 - 29
  • [8] Formal Analysis for Network Security Properties on a Trace Semantics
    Jiang, Yun
    Liu, Xifa
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 957 - +
  • [9] Soundness conditions for cryptographic algorithms and parameters abstractions in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 31 - 38
  • [10] Modal logic approach for analyzing security protocol guessing attacks
    Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China
    Jisuanji Xuebao, 2007, 6 (924-933): : 924 - 933