咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 9 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 6 篇 网络空间安全
    • 3 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 机械工程
  • 5 篇 理学
    • 5 篇 数学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 12 篇 formal analysis
  • 3 篇 cryptographic pr...
  • 1 篇 fisheye view
  • 1 篇 design-by-contra...
  • 1 篇 non-linear magni...
  • 1 篇 fdr2
  • 1 篇 state explore
  • 1 篇 visual modelling...
  • 1 篇 model checking
  • 1 篇 security verific...
  • 1 篇 authentication e...
  • 1 篇 abstract state m...
  • 1 篇 interaction prot...
  • 1 篇 process calculus
  • 1 篇 stochastic proce...
  • 1 篇 fairness
  • 1 篇 security protoco...
  • 1 篇 performance anal...
  • 1 篇 authentication p...
  • 1 篇 network survivab...

机构

  • 1 篇 institute of com...
  • 1 篇 college of compu...
  • 1 篇 school of inform...
  • 1 篇 schoolofcomputer...
  • 1 篇 general office c...
  • 1 篇 school of softwa...
  • 1 篇 上海交通大学
  • 1 篇 college of infor...
  • 1 篇 institute of com...
  • 1 篇 statekeylaborato...
  • 1 篇 information clas...
  • 1 篇 college of infor...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 school of comput...
  • 1 篇 贵州大学
  • 1 篇 department of ma...
  • 1 篇 school of softwa...
  • 1 篇 center of comput...

作者

  • 1 篇 顾永跟
  • 1 篇 陈晓桦
  • 1 篇 hu huaping
  • 1 篇 王慧强
  • 1 篇 chang yinlong
  • 1 篇 huaijinpeng lixi...
  • 1 篇 徐森
  • 1 篇 罗铮
  • 1 篇 杨硕
  • 1 篇 张克非
  • 1 篇 ke yang
  • 1 篇 张保稳
  • 1 篇 吕银华
  • 1 篇 zhang xiaolong(l...
  • 1 篇 ruixue deng-guof...
  • 1 篇 meihua xiao
  • 1 篇 朱涵
  • 1 篇 xiao meihua
  • 1 篇 mert ozkaya
  • 1 篇 ma chenglin

语言

  • 11 篇 英文
  • 1 篇 中文
检索条件"主题词=formal analysis"
12 条 记 录,以下是1-10 订阅
排序:
formal analysis of SA-TEK 3-Way Handshake Protocols
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2023年 第6期28卷 753-762页
作者: 徐森 杨硕 张克非 College of Computer Science and Technology Shenyang University of Chemical TechnologyShenyang 110142China
IEEE 802.16 is the standard for broadband wireless *** security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are *** IEEE 802.1... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel formal analysis Method of Network Survivability Based on Stochastic Process Algebra
收藏 引用
Tsinghua Science and Technology 2007年 第S1期12卷 175-179页
作者: 赵国生 王慧强 王健 Center of Computer Network and Information Harbin Normal University Institute of Computer Science and Technology Harbin Engineer UniversityHarbin 150001China Institute of Computer Science and Technology Harbin Engineer University
Stochastic process algebras have been proposed as compositional specification formalisms for performance models. A formal analysis method of survivable network was proposed based on stochastic process algebra, which i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第3期138卷 2641-2663页
作者: Ke Yang Meihua Xiao Zehuan Li School of Electrical Engineering and Automation East China Jiaotong UniversityNanchang330013China School of Software East China Jiaotong UniversityNanchang330013China
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure *** protocols are widely used in electronic payment systems and electronic co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Approach to Automatic Security Protocol analysis Based on Authentication Event Logic
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 187-192页
作者: XIAO Meihua MA Chenglin DENG Chunyan ZHU Ke School of Software East China Jiaotong University
Since security protocols form the cornerstones of modern secure networked systems, it is important to develop informative, accurate, and deployable approach for finding errors and proving that protocols meet their sec... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Visual Specification and analysis of Contract-Based SoftwareArchitectures
收藏 引用
Journal of Computer Science & Technology 2017年 第5期32卷 1025-1043页
作者: Mert Ozkaya Department of Computer Engineering Istanbul Kemerburgaz University Istanbul 34217 Turkey
XCD is a design-by-contract based architecture description language that supports modular specifications in terms of components and connectors (i.e., interaction protocols). XCD is supported by a translator that produ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Algebra model and security analysis for cryptographic protocols
收藏 引用
Science in China(Series F) 2004年 第2期47卷 199-220页
作者: HUAIJinpeng LIXianxian SchoolofComputer BeijingUniversityofAeronauticsandAstronauticsBeijing100083China
More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptographic protocol security analysis based on bounded constructing algorithm
收藏 引用
Science in China(Series F) 2006年 第1期49卷 26-47页
作者: LI Xianxian HUAI Jinpeng School of Computer Beihang University Beijing 100083 China
An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Security analysis of an Electronic Commerce Protocol Using Casper/FDR2
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第6期17卷 499-503页
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network System Fuzhou UniversityFuzhou 350108FujianChina School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New Semantic Model for Authentication Protocols in ASMs
收藏 引用
Journal of Computer Science & Technology 2004年 第4期19卷 555-563页
作者: RuiXue Deng-GuoFeng StateKeyLaboratoryofInformationSecurity InstituteofSoftwareTheChineseAcademyofSciencesBeijing100080P.R.China
A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cursor caging:enhancing focus targeting in interactive fisheye views
收藏 引用
Science China(Information Sciences) 2013年 第5期56卷 115-130页
作者: SONG HongZhi FU Yi ZHANG Liang ZHANG XiaoLong(Luke) College of Informatics South China Agricultural University College of Information Sciences and Technology Pennsylvania State University307D IST BuildingUniversity ParkPA 16802USA
Fisheye view is an effective approach to visualizing and navigating large data sets by offering both local details and global context in the same ***,by using different magnification factors for detail and context inf... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论