期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
SeVe: automatic tool for verification of security protocols
1
作者 anh tuan luu Jun SUN +3 位作者 Yang LIU Jin Song DONG Xiaohong LI Thanh Tho QUAN 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第1期57-75,共19页
Security protocols play more and more important roles with wide use in many applications nowadays. Cur- rently, there are many tools for specifying and verifying secu- rity protocols such as Casper/FDR, ProVerif, or A... Security protocols play more and more important roles with wide use in many applications nowadays. Cur- rently, there are many tools for specifying and verifying secu- rity protocols such as Casper/FDR, ProVerif, or AVISPA. In these tools, the intruder's ability, which either needs to be specified explicitly or set by default, is not flexible in some circumstances. Moreover, whereas most of the existing tools focus on secrecy and authentication properties, few supports privacy properties like anonymity, receipt freeness, and coer- cion resistance, which are crucial in many applications such as in electronic voting systems or anonymous online transac- tions. In this paper, we introduce a framework for specifying security protocols in the labeled transition system (LTS) se- mantics model, which embeds the knowledge of the par- ticipants and parameterizes the ability of an attacker. Us- ing this model, we give the formal definitions for three types of privacy properties based on trace equivalence and knowledge reasoning. The formal definitions for some other security properties, such as secrecy and authentica- tion, are introduced under this framework, and the veri- fication algorithms are also given. The results of this pa- per are embodied in the implementation of a SeVe mod- ule in a process analysis toolkit (PAT) model checker, which supports specifying, simulating, and verifying se- curity protocols. The experimental results show that a SeVe module is capable of verifying many types of secu- rity protocols and complements the state-of-the-art securityverifiers in several aspects. Moreover, it also proves the abil- ity in building an automatic verifier for security protocols re- lated to privacy type, which are mostly verified by hand now. 展开更多
关键词 security protocols model checking processanalysis toolkit (PAT) AUTHENTICATION SECRECY PRIVACY
原文传递
LiMn_2O_4/CNTs and LiNi_(0.5)Mn_(1.5)O_4/CNTs Nanocomposites as High-Performance Cathode Materials for Lithium-Ion Batteries
2
作者 Thang Van Le Ha Tran Nguyen +2 位作者 anh tuan luu Man Van Tran Phung Loan My Le 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 2015年第1期122-128,共7页
The demand of higher energy density and higher power capacity of lithium(Li)-ion secondary batteries has led to the search for electrode materials whose capacities and performance are better than those available tod... The demand of higher energy density and higher power capacity of lithium(Li)-ion secondary batteries has led to the search for electrode materials whose capacities and performance are better than those available today. Carbon nanotubes(CNTs), with their unique properties such as 1D tubular structure, high electrical and thermal conductivities, and extremely large surface area, have been used as materials to prepare cathodes for Li-ion batteries. The structure and morphology of CNTs were analyzed by X-ray diffraction(XRD), scanning electron microscopy(SEM), and transmission electron microscopy(TEM). The functional groups on the purified CNT surface such as –COOH, –OH were characterized by Fourier Transform infrared spectroscopy. The electrode materials were fabricated from LiMn2O4(LMO), doped spinel LiNi0.5Mn1.5O4, and purified CNTs via solid-state reaction. The structure and morphology of the electrode were characterized using XRD, SEM, and TEM. Finally, the efficiency of the electrode materials using CNTs was evaluated by cyclic voltammetry and electrochemical impedance spectroscopy. 展开更多
关键词 Nanocomposites Carbon nanotubes(CNTs) Spinel materials Lithium-ion batteries(LIBs)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部