Secrecy analysis of security protocol based on reachability relation

被引:0
作者
Gu, Yong-Gen [1 ,2 ]
Fu, Yu-Xi [2 ]
Zhu, Han [2 ]
机构
[1] Department of Computer Science and Technology, Huzhou Normal University, Huzhou 313000, China
[2] Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2007年 / 30卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:255 / 261
相关论文
共 50 条
[41]   Cryptographic protocol security analysis based on bounded constructing algorithm [J].
Xianxian Li ;
Jinpeng Huai .
Science in China Series F, 2006, 49 :26-47
[42]   Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol [J].
Feng, Tao ;
Wu, Yi .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[43]   Security analysis of Kerberos protocol based on the strand space model [J].
Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China .
Gaojishu Tongxin, 2008, 9 (909-914) :909-914
[44]   Towards an awareness-based semantics for security protocol analysis [J].
Accorsi, Rafael ;
Basin, David ;
Viganò, Luca .
Electronic Notes in Theoretical Computer Science, 2003, 55 (01) :5-24
[45]   THE INTERROGATOR - PROTOCOL SECURITY ANALYSIS [J].
MILLEN, JK ;
CLARK, SC ;
FREEDMAN, SB .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :274-288
[46]   Security Analysis of the SASI Protocol [J].
Cao, Tianjie ;
Bertino, Elisa ;
Lei, Hong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) :73-77
[47]   Secrecy Capacity Analysis of 4-WFRFT Based Physical Layer Security in MIMO System [J].
Xu, Tao ;
Wu, Xuanli ;
Xie, Ziyi ;
Meng, Xiangyun ;
Zhang, Tingting .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) :19313-19326
[48]   Security Analysis of SKI Protocol [J].
Babvey, Pouria ;
Yajam, Habib Allah ;
Eghlidos, Taraneh .
2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, :199-203
[49]   Analysis of a security protocol in μCRL [J].
Pang, J .
FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 :396-400
[50]   A security analysis of the OAuth protocol [J].
Yang, Feng ;
Manoharan, Sathiamoorthy .
2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, :271-276