期刊文献+

应用组合方法设计普适计算网络安全协议 被引量:1

Security protocol for ubiquitous computing network design by composition method
下载PDF
导出
摘要 给出一种新的安全协议的设计方法——组合设计方法,首先分别实现各个安全目标,然后将它们组合为一个新的安全协议。组合方法设计安全协议具有易于实现、易于验证等优点。给出组合规则,使用组合方法实现了普适计算环境下认证协议及密钥协商协议的设计。 This paper proposed a novel design method-design by composition,constructing a complicated protocol from simple protocol primitived without destroying the security properties established by each independent part.This method made the design and verification of the protocol easier to handle.The regulations of composition had been present.And with these regulations of composition design,this paper implemented an authentication protocol and a key agreement protocol for ubiquitous computing network.
出处 《计算机应用研究》 CSCD 北大核心 2009年第3期1073-1075,1108,共4页 Application Research of Computers
基金 国家教育部科学技术研究重点资助项目(104086)
关键词 普适计算 安全协议设计 组合方法 ubiquitous computing security protocols design composition method
  • 相关文献

参考文献6

  • 1FOLEY S N,ZHOU Hong-bin.Towards a framework for autonomicsecurity protocols[].Proc of International Security Protocols Work-shop.2003
  • 2DATTA A,DEREK A,MITCHELL J C,et al.derivation system forsecurity protocols and its logical formalization[].Proc of the thComputer Security Foundation Workshop.2003
  • 3GONG Li,SYVERSON P.Fail-stop protocols:an approach to designingsecure protocols[].Proc of the th International WorkingConf erence on Dependable Computing for Critical Applications(DC-CA-).1995
  • 4BUTTYAN L,STAAMANN S,WILHELMU.A simple logic for au-thentication protocol design[].Proc of the th Computer SecurityFoundations Workshop.1998
  • 5Weiser,M.,Brown,J.S.,Denning,P.J.,Metcalfe,R.M.The Coming Age of Calm Technology[].Beyond Calculation: The Next Fifty Years of Computing.1998
  • 6Abadi M,Needham R.Prudent Engineering Practice for Cryptographic Protocols[].IEEE Trans on SoftwareEngineering.1996

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部