安全协议的形式化分析技术与方法

薛锐, 冯登国 - 计算机学报, 2006 - cqvip.com
对于安全协议的形式化分析方法从技术特点上做了分类和分析. 对于安全协议分析技术的发展
历史, 目前的状况以及将来的趋势作了总体的介绍和总结. 根据作者的体会 …

[图书][B] Managing information systems security and privacy

D Trcek - 2006 - books.google.com
The book deals with the management of information systems security and privacy, based on
a model that covers technological, organizational and legal views. This is the basis for a …

Trust management and trust theory revision

J Ma, MA Orgun - IEEE Transactions on Systems, Man, and …, 2006 - ieeexplore.ieee.org
A theory of trust for a given system consists of a set of rules that describe trust of agents in
the system. In a certain logical framework, the theory is generally established based on the …

一次性口令身份认证方案的分析与改进

王滨, 张远洋 - 计算机工程, 2006 - cqvip.com
分析了文献[1] 中的一次性口令的身份认证方案, 发现由于原方案是一个单向认证协议,
因此不能抵抗中间人攻击, 该文在不增加计算复杂度的前提下, 对原方案进行了改进 …

Key establishment: Proofs and refutations

KKR Choo - 2006 - eprints.qut.edu.au
We study the problem of secure key establishment. We critically examine the security
models of Bellare and Rogaway (1993) and Canetti and Krawczyk (2001) in the …

[PDF][PDF] 不可否认协议时限性的形式化分析

黎波涛, 罗军舟 - 2006 - Citeseer
虽然SVO 逻辑由于其简单性在对不可否认协议的形式化分析中得到了广泛的应用,
但它在时间描述能力上的不足使得它无法分析不可否认协议的时限性. 通过向SVO …

Understanding the intruder through attacks on cryptographic protocols

S Muhammad, Z Furqan, RK Guha - Proceedings of the 44th annual …, 2006 - dl.acm.org
The vulnerability and importance of computers, robots, internet etc, demand the employment
of exceedingly reliable methods in the design of secure systems. Security protocols are one …

The approaches and technologies for formal verification of security protocols

R Xue, D Feng - CHINESE JOURNAL OF COMPUTERS-CHINESE …, 2006 - cjc.ict.ac.cn
Background The formal methods for verifying security protocols are classified and analyzed
from technological points of view. Authors survey the developing history of analyzing …

Knowledge flow analysis for security protocols

E Torlak, M van Dijk, B Gassend, D Jackson… - arXiv preprint cs …, 2006 - arxiv.org
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A
protocol is described by a collection of rules constraining the propagation of knowledge …

一种面向电子邮件的不可否认协议及其形式化分析

彭红艳, 李肖坚, 夏春和, 邓剑锋, 周小发 - 计算机研究与发展, 2006 - cqvip.com
不同应用环境下不可否认协议的目标是不同的, 面向电子邮件的不可否认协议目标有:
双方不可否认; 公平; 协议能抵御常见的篡改和重放攻击; 减少对可信第三方的信赖程度 …