[PDF][PDF] 安全协议20 年研究进展
卿斯汉 - 软件学报, 2003 - jos.org.cn
安全协议20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软件学报 1000-9825/2003/14(10)1740
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …
Authenticity by typing for security protocols
We propose a new method to check authenticity properties of cryptographic protocols. First,
code up the protocol in the spi-calculus of Abadi and Gordon. Second, specify authenticity …
code up the protocol in the spi-calculus of Abadi and Gordon. Second, specify authenticity …
Authentication tests and the structure of bundles
JD Guttman, FJ Thayer - Theoretical computer science, 2002 - Elsevier
Suppose a principal in a cryptographic protocol creates and transmits a message containing
a new value v, later receiving v back in a different cryptographic context. It can be concluded …
a new value v, later receiving v back in a different cryptographic context. It can be concluded …
Types and effects for asymmetric cryptographic protocols
We present the first type and effect system for proving authenticity properties of security
protocols based on asymmetric cryptography. The most significant new features of our type …
protocols based on asymmetric cryptography. The most significant new features of our type …
Protocol independence through disjoint encryption
JD Guttman, FJF Thayer - Proceedings 13th IEEE Computer …, 2000 - ieeexplore.ieee.org
One protocol (called the primary protocol) is independent of other protocols (jointly called
the secondary protocol) if the question whether the primary protocol achieves a security goal …
the secondary protocol) if the question whether the primary protocol achieves a security goal …
Security protocol design via authentication tests
JD Guttman - Proceedings 15th IEEE Computer Security …, 2002 - ieeexplore.ieee.org
We describe a protocol design process, and illustrate its use by creating ATSPECT, an
authentication test-based secure protocol for electronic commerce transactions. The design …
authentication test-based secure protocol for electronic commerce transactions. The design …
Twenty years development of security protocols research
卿斯汉 - Journal of software, 2003 - jos.org.cn
安全协议 20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软 件 学 报 1000-9825/2003/14(10)1740
安全协议 20 年研究进展 ∗ 卿斯汉+ (中国科学院 信息安全技术工程研究中心,北京 100080) (中国 …
安全协议 20 年研究进展 ∗ 卿斯汉+ (中国科学院 信息安全技术工程研究中心,北京 100080) (中国 …
Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement protocols
We describe our new results in developing and extending Automatic Protocol Generation
(APG), an approach to automatically generate security protocols. We explore two-party …
(APG), an approach to automatically generate security protocols. We explore two-party …
Scalable parallel graph partitioning
S Kirmani, P Raghavan - Proceedings of the international conference on …, 2013 - dl.acm.org
We consider partitioning a graph in parallel using a large number of processors. Parallel
multilevel partitioners, such as Pt-Scotch and ParMetis, produce good quality partitions but …
multilevel partitioners, such as Pt-Scotch and ParMetis, produce good quality partitions but …
[PDF][PDF] 3GPP 认证与密钥协商协议安全性分析
陆峰, 郑康锋, 钮心忻, 杨义先, 李忠献 - 软件学报, 2010 - jos.org.cn
通用移动通信系统采用3GPP 认证与密钥协商协议作为其安全框架, 该协议对GSM
存在的安全隐患作了有效的改进. 对3GPP 认证与密钥协商协议进行安全性研究 …
存在的安全隐患作了有效的改进. 对3GPP 认证与密钥协商协议进行安全性研究 …