Secrecy analysis of security protocol based on reachability relation

被引:0
|
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
  • [31] SECRECY, SECURITY AND FREEDOM
    不详
    NATURE, 1957, 179 (4572) : 1203 - 1205
  • [32] Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability
    Pelozo, Silvia S.
    D'Argenio, Pedro R.
    TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 : 182 - 197
  • [33] Performance analysis of the REAchability protocol for IPv6 multihoming
    de la Oliva, Antonio
    Bagnulo, Marcelo
    Garcia-Martinez, Alberto
    Soto, Ignacio
    NEXT GENERATION TELETRAFFIC AND WIRED/WIRELESS ADVANCED NETWORKING, PROCEEDINGS, 2007, 4712 : 443 - +
  • [34] VERIFICATION OF PROTOCOL CONFORMANCE TEST CASES USING REACHABILITY ANALYSIS
    NAIK, K
    SARIKAYA, B
    JOURNAL OF SYSTEMS AND SOFTWARE, 1992, 19 (01) : 41 - 57
  • [35] PROTOCOL VERIFICATION ALGORITHM USING REDUCED REACHABILITY ANALYSIS.
    Itoh, Masaki
    Ichikawa, Haruhisa
    Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E, 1983, E66 (02): : 88 - 93
  • [36] Analysis and Improvement of Mobile Payment Security Based on SET Protocol
    Li, Xiao-min
    Liang, Bing
    Wang, Jian-ping
    MATERIALS AND COMPUTATIONAL MECHANICS, PTS 1-3, 2012, 117-119 : 615 - 618
  • [37] Cryptographic protocol security analysis based on bounded constructing algorithm
    LI Xianxian & HUAI Jinpeng School of Computer
    Science in China(Series F:Information Sciences), 2006, (01) : 26 - 47
  • [38] Rule-based dependency models for security protocol analysis
    Chen, Qingfeng
    Zhang, Shichao
    Chen, Yi-Ping Phoebe
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2008, 15 (04) : 369 - 380
  • [39] Cryptographic protocol security analysis based on bounded constructing algorithm
    Li, XX
    Huai, JP
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47
  • [40] Security analysis of TLS protocol implementations based on model checking
    Bi X.
    Tang C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846