咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 1 篇 控制科学与工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 security protoco...
  • 2 篇 ban logic
  • 2 篇 authentication
  • 2 篇 idealization
  • 2 篇 strand spaces
  • 1 篇 secret sharing
  • 1 篇 symmetric key cr...
  • 1 篇 mutual authentic...
  • 1 篇 loet
  • 1 篇 fresh ciphertext
  • 1 篇 random oracle mo...
  • 1 篇 standardmodel
  • 1 篇 model checking
  • 1 篇 formal analysis
  • 1 篇 radiofrequency i...
  • 1 篇 authentication e...
  • 1 篇 processanalysis ...
  • 1 篇 secure communica...
  • 1 篇 radio frequency ...
  • 1 篇 ultralightweight...

机构

  • 2 篇 school of softwa...
  • 1 篇 faculty of compu...
  • 1 篇 东南大学
  • 1 篇 department of ap...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 departmentofcomp...
  • 1 篇 institute of fun...
  • 1 篇 faculty of mathe...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of comput...

作者

  • 2 篇 xiao meihua
  • 1 篇 jun sun
  • 1 篇 cao li-li chen k...
  • 1 篇 seyed amin hosse...
  • 1 篇 zhang tong
  • 1 篇 zhong xiaomei
  • 1 篇 蒋睿
  • 1 篇 anh tuan luu
  • 1 篇 juli rejito
  • 1 篇 kotulski zbignie...
  • 1 篇 luo yunxian
  • 1 篇 caoli-li chenke-...
  • 1 篇 yang ke
  • 1 篇 ma chenglin
  • 1 篇 kulesza kamil
  • 1 篇 somayeh soltani
  • 1 篇 rahmat budiarto
  • 1 篇 zhu ke
  • 1 篇 xiaohong li
  • 1 篇 yang liu

语言

  • 8 篇 英文
  • 1 篇 中文
检索条件"主题词=Security protocols"
9 条 记 录,以下是1-10 订阅
排序:
SeVe: automatic tool for verification of security protocols
收藏 引用
Frontiers of Computer Science 2012年 第1期6卷 57-75页
作者: Anh Tuan LUU Jun SUN Yang LIU Jin Song DONG Xiaohong LI Thanh Tho QUAN School of Computing National University of Singapore Singapore 119077 Singapore School of Computing Singapore University of Technology and Design Singapore 138682 Singapore Department of Computer Science Tianjin University Tianjin 300222 China Department of Computer Science HoChiMinhCity University of Technology HoChiMinh City 162903 Vietnam
security protocols play more and more important roles with wide use in many applications nowadays. Cur- rently, there are many tools for specifying and verifying secu- rity protocols such as Casper/FDR, ProVerif, or A... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modular approach to the design and analysis of password-based security protocols
收藏 引用
Science in China(Series F) 2007年 第3期50卷 381-398页
作者: FENG DengGuo CHEN WeiDong State Key Laboratory of Information security Institute of Software Chinese Academy of Sciences Beijing100080 China
In this paper, a general framework for designing and analyzing password-based security protocols is presented. First we introduce the concept of "weak computational indistinguishability" based on current progress of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On ASGS framework:general requirements and an example of implementation
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2007年 第4期8卷 511-521页
作者: KULESZA Kamil KOTULSKI Zbigniew Department of Applied Mathematics and Theoretical Physics University of CambridgeCambridge CB3 0WAUK Institute of Fundamental Technological ResearchPolish Academy of SciencesWarsaw 00-049Poland Institute of Fundamental Technological Research Polish Academy of SciencesWarsaw 00-049Poland
In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from kno... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Approach to Automatic security Protocol Analysis Based on Authentication Event Logic
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 187-192页
作者: XIAO Meihua MA Chenglin DENG Chunyan ZHU Ke School of Software East China Jiaotong University
Since security protocols form the cornerstones of modern secure networked systems, it is important to develop informative, accurate, and deployable approach for finding errors and proving that protocols meet their sec... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 79-88页
作者: ZHONG Xiaomei XIAO Meihua ZHANG Tong YANG Ke LUO Yunxian School of Software East China Jiaotong University
The increasing commercialization and massive deployment of radio frequency identification(RFID) systems has raised many security related issues which in return evokes the need of security protocols. Logic of events th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 5891-5910页
作者: Somayeh Soltani Seyed Amin Hosseini Seno Juli Rejito Rahmat Budiarto Department of Computer Engineering Ferdowsi University of MashhadMashhad***Iran Faculty of Mathematics and Science Universitas PadjadjaranJatinangor45363Indonesia Faculty of Computer Science Universitas Mercu BuanaJakarta11650Indonesia
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their *** coverage and service stability of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Towards the Idealization Procedure of BAN-Like Logics
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 214-218页
作者: CAOLi-li CHENKe-fei DepartmentofComputerScienceandEngineering ShanghaiJiaotongUniversityShanghai200030China
We demonstrate the flaws of Mao's method, which is an augmentation ofprotocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao'smethod. Furthermore, we give some theoretical ana... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing
收藏 引用
Journal of Southeast University(English Edition) 2012年 第4期28卷 392-397页
作者: 刘晓 蒋睿 东南大学信息科学与工程学院 南京210096
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the cod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Towards the Idealization Procedure of BAN-Like Logics
Towards the Idealization Procedure of BAN-Like Logics
收藏 引用
The 1st Chinese Conference on Trusted Computing and Information security
作者: CAO Li-li, CHEN Ke-fei Department of Computer Science and Engineering, Shanghai Jiaotong University,Shanghai 200030, China
<正> We demonstrate the flaws of Mao’s method, which is an augmentation of protocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao’s method. Furthermore, we give some theo... 详细信息
来源: cnki会议 评论