Secrecy analysis of security protocol based on reachability relation

被引:0
|
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
  • [1] Improved Reachability Analysis for Security Management
    Basile, Cataldo
    Canavese, Daniele
    Lioy, Antonio
    Pitscheider, Christian
    PROCEEDINGS OF THE 2013 21ST EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2013, : 534 - 541
  • [2] Protocol validation by simultaneous reachability analysis
    Ozdemir, K
    Ural, H
    COMPUTER COMMUNICATIONS, 1997, 20 (09) : 772 - 788
  • [3] AN IMPROVED PROTOCOL REACHABILITY ANALYSIS TECHNIQUE
    HOLZMANN, GJ
    SOFTWARE-PRACTICE & EXPERIENCE, 1988, 18 (02): : 137 - 161
  • [4] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [5] Secrecy analysis in protocol composition logic
    Roy, Arnab
    Datta, Anupam
    Derek, Ante
    Mitchell, John C.
    Seifert, Jean-Pierre
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 197 - +
  • [6] Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability
    Mao, Litao
    Li, Yongzhao
    Li, Tao
    Gao, Mingjun
    Zhang, Hailin
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 336 - 340
  • [7] From perfect secrecy to perfect safety & security:Cryptography-based analysis of endogenous security
    Liang Jin
    Xiaoyan Hu
    Jiangxing Wu
    Security and Safety, 2023, 2 (03) : 4 - 19
  • [8] DISTRIBUTED REACHABILITY ANALYSIS FOR PROTOCOL VERIFICATION ENVIRONMENTS
    AGGARWAL, S
    ALONSO, R
    COURCOUBETIS, C
    LECTURE NOTES IN CONTROL AND INFORMATION SCIENCES, 1988, 103 : 40 - 56
  • [9] IMPROVED PROTOCOL REACHABILITY ANALYSIS TECHNIQUE.
    Holzmann, Gerard J.
    Software - Practice and Experience, 1988, 18 (02) : 137 - 161
  • [10] Analysis of Security Protocol Based on Petri Nets
    Liu, Fengli
    Han, Wei
    Jiang, Mingyue
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 48 - 51