Secrecy analysis of security protocol based on reachability relation

被引:0
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2007年 / 30卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
[31]   SECRECY, SECURITY AND FREEDOM [J].
不详 .
NATURE, 1957, 179 (4572) :1203-1205
[32]   Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability [J].
Pelozo, Silvia S. ;
D'Argenio, Pedro R. .
TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 :182-197
[33]   Performance analysis of the REAchability protocol for IPv6 multihoming [J].
de la Oliva, Antonio ;
Bagnulo, Marcelo ;
Garcia-Martinez, Alberto ;
Soto, Ignacio .
NEXT GENERATION TELETRAFFIC AND WIRED/WIRELESS ADVANCED NETWORKING, PROCEEDINGS, 2007, 4712 :443-+
[34]   VERIFICATION OF PROTOCOL CONFORMANCE TEST CASES USING REACHABILITY ANALYSIS [J].
NAIK, K ;
SARIKAYA, B .
JOURNAL OF SYSTEMS AND SOFTWARE, 1992, 19 (01) :41-57
[35]   PROTOCOL VERIFICATION ALGORITHM USING REDUCED REACHABILITY ANALYSIS. [J].
Itoh, Masaki ;
Ichikawa, Haruhisa .
Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E, 1983, E66 (02) :88-93
[36]   Analysis and Improvement of Mobile Payment Security Based on SET Protocol [J].
Li, Xiao-min ;
Liang, Bing ;
Wang, Jian-ping .
MATERIALS AND COMPUTATIONAL MECHANICS, PTS 1-3, 2012, 117-119 :615-618
[37]   Cryptographic protocol security analysis based on bounded constructing algorithm [J].
LI Xianxian HUAI Jinpeng School of Computer Beihang University Beijing China .
Science in China(Series F:Information Sciences), 2006, (01) :26-47
[38]   Rule-based dependency models for security protocol analysis [J].
Chen, Qingfeng ;
Zhang, Shichao ;
Chen, Yi-Ping Phoebe .
INTEGRATED COMPUTER-AIDED ENGINEERING, 2008, 15 (04) :369-380
[39]   Cryptographic protocol security analysis based on bounded constructing algorithm [J].
Li, XX ;
Huai, JP .
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01) :26-47
[40]   Security analysis of TLS protocol implementations based on model checking [J].
Bi X. ;
Tang C. .
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03) :839-846