An extended strand space method for fairness analysis of non-repudiation protocols

被引:0
|
作者
Li, Lei [1 ]
Chen, Jing [2 ]
Wang, Yumin [1 ]
机构
[1] National Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China
[2] School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
13
引用
收藏
页码:16 / 20
相关论文
共 50 条
  • [31] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405
  • [32] RFID-Based Non-repudiation Protocols for Supply Chains
    Piramuthu, Selwyn
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2017, 2017, 759 : 56 - 69
  • [33] Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
    Klay, Francis
    Vigneron, Laurent
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 192 - +
  • [34] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [35] A game-based verification of non-repudiation and fair exchange protocols
    Kremer, Steve
    Raskin, Jean-François
    Journal of Computer Security, 2003, 11 (03) : 399 - 429
  • [36] Non-repudiation analysis using LYSA with annotations
    Bruso, Mayla
    Cortesi, Agostino
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2010, 36 (04) : 352 - 377
  • [37] A theorem-proving approach to verification of fair non-repudiation protocols
    Wei, Kun
    Heather, James
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 202 - +
  • [38] An Improved Non-Repudiation Protocol and Its Security Analysis
    Li Li 1
    2.State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2004, (03) : 288 - 292
  • [39] An improved non-repudiation protocol and its security analysis
    Li, Li
    Zhang, Huan-Guo
    Wang, Li-Na
    Wuhan University Journal of Natural Sciences, 2004, 9 (03) : 288 - 292
  • [40] Generic non-repudiation protocols supporting transparent off-line TTP
    Wang, Guilin
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (05) : 441 - 467