Formal analysis of cryptographic protocols in a knowledge algorithm logic framework

被引:0
|
作者
State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Chin J Electron | 2007年 / 4卷 / 701-706期
关键词
Network protocols;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [32] Modeling of cryptographic protocols in first-order logic
    Han, Jihong
    Zhou, Zhiyong
    Wang, Yadi
    Yuan, Lin
    PROCEEDINGS OF THE ISSAT INTERNATIONAL CONFERENCE ON MODELING OF COMPLEX SYSTEMS AND ENVIRONMENTS, PROCEEDINGS, 2007, : 66 - +
  • [33] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [34] Formal analysis of a probabilistic knowledge communication framework
    Gluz, Joao Carlos
    Viccari, Rosa Maria
    Flores, Cecilia Dias
    Seixas, Louise
    ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA-SBIA 2006, PROCEEDINGS, 2006, 4140 : 138 - 148
  • [36] A formal framework for security analysis of NFC mobile coupon protocols
    Alshehri, Ali
    Schneider, Steve
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (06) : 685 - 707
  • [37] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
    Berndt, Sebastian
    Wichelmann, Jan
    Pott, Claudius
    Traving, Tim-Henrik
    Eisenbarth, Thomas
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
  • [38] LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
    Wu, Fusheng
    Liu, Jinhui
    Li, Yanbin
    Ni, Mingtao
    IET INFORMATION SECURITY, 2024, 2024
  • [39] A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with Reasoning
    Yan, Jingchen
    Ishibashi, Sho
    Goto, Yuichi
    Cheng, Jingde
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 210 - 215
  • [40] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25