Logical verification of secure electronic transactions protocol

被引:0
|
作者
Chen, Qingfeng
Wang, Ju
Bai, Shuo
Zhang, Shichao
Sui, Liying
机构
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 03期
关键词
Cryptography - Formal logic - Network protocols - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
In the previous work, some segments of secure electronic transactions (SET) are verified, and some potential problems in SET are also discussed. Based on these, all transactions in SET are strictly logically verified. Through this formal logic verification, certain problems, which exist in SET are found. Solutions to these problems are also discussed.
引用
收藏
页码:346 / 362
相关论文
共 50 条
  • [1] Design and verification of a secure electronic auction protocol
    Subramanian, S
    SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 204 - 210
  • [2] A protocol for secure transactions
    Steves, DH
    EdmondsonYurkanan, C
    Gouda, M
    PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, : 201 - 212
  • [3] Verification of Mondex electronic purses with KIV: from transactions to a security protocol
    Haneberg, Dominik
    Schellhorn, Gerhard
    Grandy, Holger
    Reif, Wolfgang
    FORMAL ASPECTS OF COMPUTING, 2008, 20 (01) : 41 - 59
  • [4] Secure, atomic electronic commerce protocol and its formal verification
    Wu, Zhigang
    Fang, Binxing
    Sun, Peng
    Li, Yaping
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (07): : 869 - 873
  • [5] Mobile agents for secure electronic transactions
    Department of Informatics, University of Piraeus, 80, Karaoli and Dimitriou, Piraeus 185 34, Greece
    Recent Adv. Signal Process. Commun., (363-368):
  • [6] An efficient multiple merchants payment protocol for secure electronic transactions based on purchase consolidation
    Sans, O
    Agnew, GB
    ELECTRONIC COMMERCE TECHNOLOGIES, PROCEEDINGS, 2001, 2040 : 1 - 19
  • [7] Watermarking protocol of secure verification
    Zhang, Jun
    Kou, Weidong
    Fan, Kai
    Ye, Lei
    JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (04)
  • [8] Mouse based signature verification for secure Internet transactions
    Lei, HS
    Palla, S
    Govindaraju, V
    Applications of Neural Networks and Machine Learning in Image Processing IX, 2005, 5673 : 153 - 160
  • [9] A secure electronic auction protocol
    Liu, SL
    Zhang, FG
    Wang, YM
    CHINESE JOURNAL OF ELECTRONICS, 2000, 9 (02): : 219 - 223
  • [10] Logical Foundations of Secure Resource Management in Protocol Implementations
    Bugliesi, Michele
    Calzavara, Stefano
    Eigner, Fabienne
    Maffei, Matteo
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 105 - 125