期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
文学史:形式、体系与功能——俄国形式主义文学演进观述评
1
作者 高燕 《江西社会科学》 2000年第6期41-43,共3页
俄国形式主义以文本形式结构作为文学史研究的逻辑起点 ,并引进了体系与功能的概念 ,在文学演进方面作出了富有启发性的论述 ,包括文学演变的动力与形式问题、文学史研究中共时性与历时性的问题、文学演进与文学外因素的关系问题。但是 ... 俄国形式主义以文本形式结构作为文学史研究的逻辑起点 ,并引进了体系与功能的概念 ,在文学演进方面作出了富有启发性的论述 ,包括文学演变的动力与形式问题、文学史研究中共时性与历时性的问题、文学演进与文学外因素的关系问题。但是 ,形式主义关于新形式代替旧形式的奇特化理论仍隐藏着心理主义的因素 ,形式体系的建立抹杀了作品的个性 ,其文学史观也未能最终沟通文学与社会生活的有机联系。 展开更多
关键词 俄国 形式议 文学演进观 文学演变动力 形式
下载PDF
Formal analysis of robust email protocol based on authentication tests 被引量:1
2
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
下载PDF
Formal Verification in 3oux Tripartite Diffie-Hellman Protocol
3
作者 祝烈煌 张子剑 +2 位作者 王峰 郭聪 袁彩霞 《China Communications》 SCIE CSCD 2012年第3期153-163,共11页
Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which d... Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography. 展开更多
关键词 UCSA computationally sound JTDH group key exchange protocol
下载PDF
Formal verification of safety protocol in train control system 被引量:6
4
作者 ZHANG Yan TANG Tao +4 位作者 LI KePing MERA Jose Manuel ZHU Li ZHAO Lin XU TianHua 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第11期3078-3090,共13页
In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the sa... In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method. 展开更多
关键词 train control system safety communication protocol interface automata VERIFICATION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部