期刊文献+

基于ProVerif的安全协议形式化分析与验证 被引量:1

Formal Analysis and Verification of Security Propertiesof Security Protocols in ProVerif
下载PDF
导出
摘要 形式化方法是分析与验证安全协议属性的强有力的工具。在对一阶定理证明器ProVerif深入研究的基础上,对简化的Needham-Schroeder认证协议进行了形式化分析。 Formal method is a powerful tool of analysis and verification of security properties of security protocols.In this paper,based on the first-order theorem prover ProVerif researched deeply,we analyzed the simplified Authentication Protocol Needham-Schroeder by formal method.
作者 汪卫
出处 《计算机安全》 2011年第10期41-44,共4页 Network & Computer Security
关键词 形式化 NEEDHAM-SCHROEDER 自动化证明 应用PI演算 formal method Needham-Schroeder automatic proof applied Pi calculus
  • 相关文献

参考文献11

  • 1Needham R. M., Schroeder M.D.. Using encryption for authentication in large networks of computers. Communications of the ACM . 1978, 21(12): 993-999.
  • 2Dolev D., Yao A. C.. On the security of public key protocols. In: Proceedings of the IEEE 22nd Annual Symposium on Founda$ions of Computer Science, Nashville, TN, 1981, 350-357.
  • 3Blancher B. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
  • 4B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In Proceeding of the IEEE Symposium on Security and Privacy, Oakland, California, May 2004, 86-100.
  • 5B. glanchet,M. Abadi, and C. Fournet. Automated Verification of Selected Equivalences for Security Protocols. In Proceeding of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), Chicago, IL, June 2005. IEEE Computer Society, 331--340.
  • 6M. Abadi, C. secure communication SIGACT Symposium (POPL' 01). March Fournet. Mobile values, new names, and In Proceeding of the 28th ACM, SIGPLAN-- on Principles of Programming Languages 2001. ACM New York, NY, USA. 2001,104-115.
  • 7R. Milner. Communicating and Mobile Systems: the π-Calculus. Cambridge University Press, 1999.
  • 8R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, parts I and II. Information and Computation,1992, 100(1):1-77.
  • 9J.Clark, J.Jacob. A survey of Authentication Protocol Literature:Version 1.0. Technique report,Nov 1997.
  • 10B. Meng. A Secure Internet Voting Protocol Based on Non-- interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext. Journal of Networks .2009, 4(5): 370-377.

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部