[PDF][PDF] 安全协议20 年研究进展

卿斯汉 - 软件学报, 2003 - jos.org.cn
安全协议20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软件学报 1000-9825/2003/14(10)1740
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …

A systematic review of data protection and privacy preservation schemes for smart grid communications

MA Ferrag, LA Maglaras, H Janicke, J Jiang… - Sustainable cities and …, 2018 - Elsevier
In this paper, we present a comprehensive survey of privacy-preserving schemes for smart
grid communications. Specifically, we select and in-detail examine thirty-two privacy …

[图书][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life

R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Mobile values, new names, and secure communication

M Abadi, C Fournet - ACM Sigplan Notices, 2001 - dl.acm.org
We study the interaction of the" new" construct with a rich but common form of (first-order)
communication. This interaction is crucial in security protocols, which are the main …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Strand spaces: Proving security protocols correct

FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

Reconciling two views of cryptography (the computational soundness of formal encryption)

M Abadi, P Rogaway - Journal of cryptology, 2002 - Springer
Two distinct, rigorous views of cryptography have developed over the years, in two mostly
separate communities. One of the views relies on a simple but effective formal approach; the …

Constraint solving for bounded-process cryptographic protocol analysis

J Millen, V Shmatikov - Proceedings of the 8th ACM conference on …, 2001 - dl.acm.org
Constraint solving for bounded-process cryptographic protocol analysis Page 1 Constraint
Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly …