Secrecy analysis of security protocol based on reachability relation

被引:0
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2007年 / 30卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
[21]   Formal proof of security algorithms based on reachability reduction [J].
Bouziane, Mohamed ;
Gire, Sophie ;
Monin, Francois ;
Nana, Laurent .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES 2016), 2016, :67-72
[22]   A logic for constraint-based security protocol analysis [J].
Corin, Ricardo ;
Saptawijaya, Ari ;
Etalle, Sandro .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :155-168
[23]   Security analysis of an RFID protocol based on insubvertible encryption [J].
Wei, Yongzhuang ;
Ouyang, Ning ;
Ma, Chunbo .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05) :958-961
[24]   Analysis of VANET Security Based on Routing Protocol Information [J].
Chen, Lu ;
Tang, Hongbo ;
Wang, Junfei .
PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2013, :134-138
[25]   Security analysis of Kerberos protocol based on SPEAR II [J].
Zhang, Chen ;
Gao, Xiao-Liang .
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10) :2292-2297
[26]   SPIN-based security protocol modeling and analysis [J].
Chen, Chunling ;
Tian, Guoliang .
Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics, 2009, 41 (05) :672-676
[27]   Security properties analysis in a TPM-based protocol [J].
Seifi, Y. ;
Suriadi, S. ;
Foo, E. ;
Boyd, C. .
International Journal of Security and Networks, 2014, 9 (02) :85-103
[28]   Disjunctive Transition Relation decomposition for efficient reachability analysis [J].
Stergiou, Stergios ;
Jain, Jawahar .
HLDVT'06: ELEVENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2006, :29-+
[29]   Partial-NOMA Based Physical Layer Security: Forwarding Design and Secrecy Analysis [J].
Zhuo, Biting ;
Duan, Wei ;
Gu, Juping ;
Gu, Xiaohui ;
Zhang, Guoan ;
Ji, Yancheng ;
Choi, Jaeho ;
Wen, Miaowen .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) :7471-7484
[30]   Privacy, secrecy and security [J].
Thompson P.B. .
Ethics and Information Technology, 2001, 3 (1) :13-19