[PDF][PDF] 安全协议20 年研究进展
卿斯汉 - 软件学报, 2003 - jos.org.cn
安全协议20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软件学报 1000-9825/2003/14(10)1740
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …
A systematic review of data protection and privacy preservation schemes for smart grid communications
In this paper, we present a comprehensive survey of privacy-preserving schemes for smart
grid communications. Specifically, we select and in-detail examine thirty-two privacy …
grid communications. Specifically, we select and in-detail examine thirty-two privacy …
[图书][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life
R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …
fundamental of all questions-and yet it had never been answered satisfactorily by science …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Mobile values, new names, and secure communication
We study the interaction of the" new" construct with a rich but common form of (first-order)
communication. This interaction is crucial in security protocols, which are the main …
communication. This interaction is crucial in security protocols, which are the main …
The applied pi calculus: Mobile values, new names, and secure communication
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …
scoped names, with communication via messages on channels. This interaction is crucial in …
Strand spaces: Proving security protocols correct
FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …
encryption is used to provide authentication or to distribute cryptographic keys for new …
[图书][B] The modelling and analysis of security protocols: the CSP approach
P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …
communication and processing of information, ensuring its confidentiality, integrity …
Reconciling two views of cryptography (the computational soundness of formal encryption)
Two distinct, rigorous views of cryptography have developed over the years, in two mostly
separate communities. One of the views relies on a simple but effective formal approach; the …
separate communities. One of the views relies on a simple but effective formal approach; the …
Constraint solving for bounded-process cryptographic protocol analysis
J Millen, V Shmatikov - Proceedings of the 8th ACM conference on …, 2001 - dl.acm.org
Constraint solving for bounded-process cryptographic protocol analysis Page 1 Constraint
Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly …
Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly …