Secrecy analysis of security protocol based on reachability relation

被引:0
|
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
  • [41] Cryptographic protocol security analysis based on bounded constructing algorithm
    Xianxian Li
    Jinpeng Huai
    Science in China Series F, 2006, 49 : 26 - 47
  • [42] Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol
    Feng, Tao
    Wu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [43] Security analysis of Kerberos protocol based on the strand space model
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914
  • [44] Towards an awareness-based semantics for security protocol analysis
    Accorsi, Rafael
    Basin, David
    Viganò, Luca
    Electronic Notes in Theoretical Computer Science, 2003, 55 (01) : 5 - 24
  • [45] THE INTERROGATOR - PROTOCOL SECURITY ANALYSIS
    MILLEN, JK
    CLARK, SC
    FREEDMAN, SB
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 274 - 288
  • [46] Security Analysis of the SASI Protocol
    Cao, Tianjie
    Bertino, Elisa
    Lei, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 73 - 77
  • [47] A security analysis of the OAuth protocol
    Yang, Feng
    Manoharan, Sathiamoorthy
    2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
  • [48] Security Analysis of SKI Protocol
    Babvey, Pouria
    Yajam, Habib Allah
    Eghlidos, Taraneh
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
  • [49] Analysis of a security protocol in μCRL
    Pang, J
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400
  • [50] Secrecy Capacity Analysis of 4-WFRFT Based Physical Layer Security in MIMO System
    Xu, Tao
    Wu, Xuanli
    Xie, Ziyi
    Meng, Xiangyun
    Zhang, Tingting
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) : 19313 - 19326