New analysis method of cryptographic protocols

被引:0
|
作者
Qian, Y.
Zhang, Y.
Bai, Y.C.
机构
来源
Jisuanji Gongcheng/Computer Engineering | 2001年 / 27卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [22] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [23] The modeling analysis of cryptographic protocols using Promela
    Xiao, Meihua
    Li, Jing
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4321 - +
  • [24] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [25] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228
  • [26] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, AP
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 83 - 89
  • [27] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [28] Analysis of some Famous Cryptographic Protocols Using the Interpretation-Function-based Method
    Houmani, Hanane
    Mejri, Mohamed
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (04): : 99 - 116
  • [29] Analysis of some famous cryptographic protocols using the interpretation-function-based method
    LSFM Research Group, Computer Science Department, Laval University, Quebec, Canada
    Int. J. Secur. Appl., 2008, 4 (99-116):
  • [30] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145