期刊文献+

安全协议的形式化说明、设计及验证 被引量:6

Formal Specification,Designing and Verification of Secure Protocol
下载PDF
导出
摘要 文中针对形式化技术在安全协议说明、设计和验证三个方面的研究和进展情况进行了详细介绍,分析了它们的原理和优缺点,并对该技术的研究发展前景提出见解。 The paper introduces the research and development of secure protocol formal specification,designing,and verification technology in detail,analyzed their principles,advantages and disadvantages,and set forth some comments about the future research of the technology. 
作者 王娜 王亚弟
出处 《计算机应用》 CSCD 北大核心 2003年第10期42-45,共4页 journal of Computer Applications
关键词 安全协议 形式化技术 协议说明 协议设计 协议验证 secure protocol formal technology protocol specification protocol designing protocol verification
  • 相关文献

参考文献9

  • 1Woo T, Lam S. A semantic model for antheatication protocols[ A].Proceedings of the IEEE, CS Symposium on Research in Secarity and Privacy[ C], 1993. 178 - 194.
  • 2Syverson P, Meadows C. A logical language for specifying cryptographic protocol requirements[ A]. Proceedings of the IEEE CS Symposium on Research in Security and Privacy[ C]. 1993. 165 -177.
  • 3Gong L. Syverson L. Fail - stop protocols: A new approach to designing secure protocols [ A]. Proceedings of the 5th International Working Conference on Dependable Computing for Critical Applications[ C]. 1995. 44-55,.
  • 4Meadows C. Formal verification of cryptographic protocols: A survey[ A]. In Advances in Cryptology - ASIA CRYPT'94[ C]. 1995. 135- 150.
  • 5Buttyan L, Staamann S, Wilhem U. A simple logic for authentication protocol design[ A]. Proceedings of the IEEE CS Computer Security Foundations Workshop[ C]. 1998.
  • 6Leduc G, Germeau F. Verification of security protocols using LOTOS-method and application[ J]. Computer Communications. 2000,23(12) : 1089 - 1103.
  • 7Lowe G. Breaking and fixing the Needham - Schroeder public key protocol using FDR[A]. Proceedings of the TACAS[C]. 1996. 147- 166.
  • 8Meadows C. The NRL protocol analyzer: an overview. Journel of Logic Programming[ J]. 1996, 26(2) : 113 - 131.
  • 9Burrows M, Abadi M, Needham RM. A Logic of Cryptographic[.J].ACM Transactions on Computer Systems, 1990,8( 1): 15-36.

同被引文献17

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部