[PDF][PDF] 安全协议20 年研究进展

卿斯汉 - 软件学报, 2003 - jos.org.cn
安全协议20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软件学报 1000-9825/2003/14(10)1740
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …

Authenticity by typing for security protocols

AD Gordon, A Jeffrey - Journal of computer security, 2003 - content.iospress.com
We propose a new method to check authenticity properties of cryptographic protocols. First,
code up the protocol in the spi-calculus of Abadi and Gordon. Second, specify authenticity …

Authentication tests and the structure of bundles

JD Guttman, FJ Thayer - Theoretical computer science, 2002 - Elsevier
Suppose a principal in a cryptographic protocol creates and transmits a message containing
a new value v, later receiving v back in a different cryptographic context. It can be concluded …

Types and effects for asymmetric cryptographic protocols

AD Gordon, A Jeffrey - Journal of Computer Security, 2004 - content.iospress.com
We present the first type and effect system for proving authenticity properties of security
protocols based on asymmetric cryptography. The most significant new features of our type …

Protocol independence through disjoint encryption

JD Guttman, FJF Thayer - Proceedings 13th IEEE Computer …, 2000 - ieeexplore.ieee.org
One protocol (called the primary protocol) is independent of other protocols (jointly called
the secondary protocol) if the question whether the primary protocol achieves a security goal …

Security protocol design via authentication tests

JD Guttman - Proceedings 15th IEEE Computer Security …, 2002 - ieeexplore.ieee.org
We describe a protocol design process, and illustrate its use by creating ATSPECT, an
authentication test-based secure protocol for electronic commerce transactions. The design …

Twenty years development of security protocols research

卿斯汉 - Journal of software, 2003 - jos.org.cn
安全协议 20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软 件 学 报 1000-9825/2003/14(10)1740
安全协议 20 年研究进展 ∗ 卿斯汉+ (中国科学院 信息安全技术工程研究中心,北京 100080) (中国 …

Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement protocols

A Perrig, D Song - Proceedings 13th IEEE Computer Security …, 2000 - ieeexplore.ieee.org
We describe our new results in developing and extending Automatic Protocol Generation
(APG), an approach to automatically generate security protocols. We explore two-party …

Scalable parallel graph partitioning

S Kirmani, P Raghavan - Proceedings of the international conference on …, 2013 - dl.acm.org
We consider partitioning a graph in parallel using a large number of processors. Parallel
multilevel partitioners, such as Pt-Scotch and ParMetis, produce good quality partitions but …

[PDF][PDF] 3GPP 认证与密钥协商协议安全性分析

陆峰, 郑康锋, 钮心忻, 杨义先, 李忠献 - 软件学报, 2010 - jos.org.cn
通用移动通信系统采用3GPP 认证与密钥协商协议作为其安全框架, 该协议对GSM
存在的安全隐患作了有效的改进. 对3GPP 认证与密钥协商协议进行安全性研究 …