Formal analysis of cryptographic protocols in a knowledge algorithm logic framework

被引:0
|
作者
State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Chin J Electron | 2007年 / 4卷 / 701-706期
关键词
Network protocols;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A Symbolic Logic with Exact Bounds for Cryptographic Protocols
    Mitchell, John C.
    LOGIC, LANGUAGE, INFORMATION AND COMPUTATION, WOLLIC 2011, 2011, 6642 : 3 - 3
  • [22] A logic for modeling the dynamics of beliefs in cryptographic protocols
    Zhang, Y
    Varadharajan, V
    PROCEEDINGS OF THE 24TH AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC 2001, 2001, 23 (01): : 215 - 222
  • [23] A novel formal logic for formal analysis of timeliness in non-repudiation protocols
    Yang, Ke
    Xiao, Meihua
    Zhong, Xiaomei
    Zhong, Yingqiang
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (08)
  • [24] Formal methods for the analysis and design of cryptographic protocols: A state-of-the-art review
    Gritzalis, S
    Nikitakos, N
    Georgiadis, P
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 119 - 132
  • [25] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [26] Formal model for cryptographic protocols based on planning theory
    Institute of Electronic Technique, Information Engineering University of PLA, Zhengzhou 450004, China
    Jisuanji Yanjiu yu Fazhan, 2008, 9 (1567-1577):
  • [27] From informal knowledge to formal logic: A realistic case study in medical protocols
    Marcos, M
    Balser, M
    ten Teije, A
    van Harmelen, F
    KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: ONTOLOGIES AND THE SEMANTIC WEB, 2002, 2473 : 49 - 64
  • [28] The study on the application of BAN logic in formal analysis of authentication protocols
    Wen, Jinghua
    Zhang, Mei
    Li, Xiang
    Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings, 2005, : 744 - 747
  • [29] Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
    Chen, Xiaojuan
    Deng, Huiwen
    APPLIED SCIENCES-BASEL, 2020, 10 (18):