Formal analysis of cryptographic protocols in a knowledge algorithm logic framework

被引:0
|
作者
State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Chin J Electron | 2007年 / 4卷 / 701-706期
关键词
Network protocols;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
    Meadows, C
    SCIENCE OF COMPUTER PROGRAMMING, 2004, 50 (1-3) : 3 - 22
  • [42] Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
    Benaissa, Nazim
    ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 251 - 264
  • [43] Formal proofs of cryptographic security of Diffie-Hellman-based protocols
    Roy, Arnab
    Datta, Anupam
    Mitchell, John C.
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 312 - +
  • [44] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [45] Cryptographic Protocols Analysis in Event B
    Benaissa, Nazim
    Mery, Dominique
    PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
  • [46] Non interference for the analysis of cryptographic protocols
    Focardi, R
    Gorrieri, R
    Martinelli, F
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
  • [47] A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 194 (01) : 61 - 83
  • [48] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [49] Formal analysis of PUFs-based authentication protocols in logic of events theory
    Zhong X.
    Xiao M.
    Yang K.
    Luo Y.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2024, 52 (02): : 69 - 76
  • [50] CVS: a compiler for the analysis of cryptographic protocols
    Durante, A
    Focardi, R
    Gorrieri, R
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212