Formal analysis of cryptographic protocols in a knowledge algorithm logic framework

被引:0
|
作者
State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Chin J Electron | 2007年 / 4卷 / 701-706期
关键词
Network protocols;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    Xiao, Meihua
    Xue, Jinyun
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 701 - 706
  • [2] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [3] Formal analysis of cryptographic protocol based on intruders algorithmic knowledge logic
    Xiao, MH
    Xue, JY
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 530 - 533
  • [4] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [5] A Formal Analysis Method with Reasoning for Cryptographic Protocols
    Yan, Jingchen
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 566 - 570
  • [6] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [7] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228
  • [8] Formal testing cryptographic protocols
    Igumnov, VS
    EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 236 - 237
  • [9] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [10] A survey on computationally sound formal analysis of cryptographic protocols
    Lei, Xin-Feng
    Song, Shu-Min
    Liu, Wei-Bing
    Xue, Rui
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016