Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches

被引:0
|
作者
Meadows, C.A.
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL
    LOWE, G
    INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 131 - 133
  • [2] Model checking analysis of needham-schroeder public-key protocol
    Zhang, Yu-Qing
    Wang, Lei
    Xiao, Guo-Zhen
    Wu, Jian-Ping
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1348 - 1352
  • [3] Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    Lowe, G
    SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
  • [4] Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
    Nesi, Monica
    Rucci, Giuseppina
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 135 (01) : 95 - 114
  • [5] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +
  • [6] Using backward strategy to the Needham-Schroeder public key protocol verification
    Kurkowski, M
    Mackow, M
    ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 249 - 259
  • [7] Formal analysis of Needham-Schroeder protocol
    Wang, Gui-Lin
    Qing, Si-Han
    Zhou, Zhan-Fei
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (SUPPL.): : 86 - 92
  • [8] Protocol Derivation System for the Needham-Schroeder family
    Zhang, Junwei
    Ma, Jianfeng
    Yang, Chao
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2687 - 2703
  • [9] Improvement and security analysis on symmetric key authentication protocol Needham-Schroeder
    Liu, Simin
    Ye, Junyao
    Wang, Yinglian
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1289 - 1293
  • [10] Protocol Derivation System for the Needham-Schroeder Family
    Zhang, Junwei
    Yang, Chao
    Ma, Jianfeng
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 836 - 840