期刊文献+

一种基于状态空间演化的网络安全协议执行验证技术

下载PDF
导出
摘要 文章提出一种基于状态空间演化的网络安全协议执行验证技术,实现对全局安全协议执行的验证。经分析表明,该技术可以做到及时发现入侵者的攻击,阻止入侵者欺骗参与者或盗取秘密信息。
作者 陈双飞
机构地区 兰州商学院
出处 《广西质量监督导报》 2007年第5期92-93,共2页
  • 相关文献

参考文献2

二级参考文献30

  • 1M Boreale.Symbolic trace analysis of cryptographic protocols.In:Proc of the 28th Int'l Conf on Automata,Language and Prograing (ICALP'01),LNCS 2076.Geneva,Switzerland:Springer-Verlag,2001.667~681
  • 2G Lowe.Breaking and fixing the Needham-Schroeder public-key protocol using FDR.In:Proc of Tools and Algorithms for the Construction and Analysis of Systems (TACAS),LNCS 1055.Passau,Germany:Springer-Verlag,1996.147~166
  • 3L C Paulson.Proving properties of security protocols by induction.In:Proc of the 10th Computer Security Foundation Workshop (CSFW10).Massachusetts:IEEE Computer Society Press,1997.70~83
  • 4F Javier,T Fabrega,J C Herzog,et al.Strand space:Proving security protocols correct.Journal of Computer Security,1999,7(2/3):191~230
  • 5C Boyd,W Mao.On a limitation of BAN logic.In:Advances in Cryptology-EUROCRYPT'93,LNCS 765.Lofthus,Norway:Springer-Verlag,1993.240~247
  • 6M Burrows,M Abadi,R Needham.A logic of authentication.In:Proc of the Royal Society of London,LNCS 426.London:Springer-Verlag,1989.233~271
  • 7L Gong,R Needham,R Yahalom.Reasoning about belief in cryptographic protocols.In:IEEE Symp on Research in Security and Privacy.Oakland:IEEE Computer Society Press,1990.234~248
  • 8P Syverson,C Meadows,I Cervesato.Dolev-Yao is no better than machiavelli.The 1st Workshop on Issues in the Theory of Security (WITS'00),Geneva,Switzerland,2000
  • 9D Dolev,A C Yao.On the security of public-key protocols.IEEE Trans on Information Theory,1983,2(29):198~208
  • 10D Sangiorgi,D Walker.The π Calculus:A Theory of Mobile Processes.England:Cambridge University Press,2001.20~50

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部