期刊文献+

安全协议的设计与验证技术

The Technology to Design and Verification of Security Protocol
下载PDF
导出
摘要 安全协议是网络安全的基础,本文分析了目前安全协议的各种设计与验证技术,对安全协议的若干热点研究方向进行了展望,提出了一种基于多方协议中心站的容错多方安全协议。 Cryptographic protocol is the base of network security. In this paper, we analyze the methods in the design and verification of security protocol and outline some major threads and emerging trends in this area. At last, we introduce a tolerant fault multiple security protocol that based on multi-user protocol center station.
出处 《电信科学》 北大核心 2005年第4期55-57,共3页 Telecommunications Science
基金 国家自然科学基金重点项目"信息防护关键技术研究"(No.69931040)
关键词 安全协议 验证技术 设计 网络安全 研究方向 中心站 容错 cryptographic protocol, design, verification
  • 相关文献

参考文献6

  • 1Bolignano D. An approach to the formal verification of electronic commerce protocols. In: Proceedings of the 10th Computer Security Foundations Workshop, Massachusetts, USA, 1997.
  • 2Schneider S A. Using CSP for protocol analysis: The Needham-Schroeder public key protocol. Technical Report, CSD-TR-96-14, Royal Holloway, University of London, 1996.
  • 3Thayer F J, Herzog I C, Guttman J D. Strand paces: proving security protocol correct. Journal of Computer Security, 1999, 7(2, 3): 191-230.
  • 4Bolognesi T, Brinksma E. Introduction to the ISO specification language LOTOS. Computer Networks and ISDN Systems, 1987,14:25-29.
  • 5Heintze N, Tygar J D. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 1996, 22(1): 16-30.
  • 6Boyd C. Hidden assumptions in cryptographic protocols. In: Proceedings of the IEEE, Boston, 1990.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部