Secrecy analysis of security protocol based on reachability relation

被引:0
|
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
  • [21] Formal proof of security algorithms based on reachability reduction
    Bouziane, Mohamed
    Gire, Sophie
    Monin, Francois
    Nana, Laurent
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES 2016), 2016, : 67 - 72
  • [22] A logic for constraint-based security protocol analysis
    Corin, Ricardo
    Saptawijaya, Ari
    Etalle, Sandro
    2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 155 - 168
  • [23] Security analysis of an RFID protocol based on insubvertible encryption
    Wei, Yongzhuang
    Ouyang, Ning
    Ma, Chunbo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05): : 958 - 961
  • [24] Analysis of VANET Security Based on Routing Protocol Information
    Chen, Lu
    Tang, Hongbo
    Wang, Junfei
    PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2013, : 134 - 138
  • [25] Security properties analysis in a TPM-based protocol
    Seifi, Y.
    Suriadi, S.
    Foo, E.
    Boyd, C.
    International Journal of Security and Networks, 2014, 9 (02) : 85 - 103
  • [26] SPIN-based security protocol modeling and analysis
    Chen, Chunling
    Tian, Guoliang
    Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics, 2009, 41 (05): : 672 - 676
  • [27] Security analysis of Kerberos protocol based on SPEAR II
    Zhang, Chen
    Gao, Xiao-Liang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10): : 2292 - 2297
  • [28] Disjunctive Transition Relation decomposition for efficient reachability analysis
    Stergiou, Stergios
    Jain, Jawahar
    HLDVT'06: ELEVENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2006, : 29 - +
  • [29] Partial-NOMA Based Physical Layer Security: Forwarding Design and Secrecy Analysis
    Zhuo, Biting
    Duan, Wei
    Gu, Juping
    Gu, Xiaohui
    Zhang, Guoan
    Ji, Yancheng
    Choi, Jaeho
    Wen, Miaowen
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 7471 - 7484
  • [30] Privacy, secrecy and security
    Thompson P.B.
    Ethics and Information Technology, 2001, 3 (1) : 13 - 19