登录    注册    忘记密码

详细信息

Verification method of security protocols and its application  ( EI收录)  

文献类型:会议论文

英文题名:Verification method of security protocols and its application

作者:Chen, Li[1]; Li, Xiaoxue[1]

第一作者:陈莉

通讯作者:Chen, L.|[10484098c9c66]陈莉;

机构:[1] Henan University of Economics and Law, Zhengzhou, Henan, China

第一机构:河南财经政法大学

通讯机构:[1]Henan University of Economics and Law, Zhengzhou, Henan, China|[10484]河南财经政法大学;

会议论文集:Proceedings - 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010

会议日期:29 October 2010 through 31 October 2010

会议地点:Xiamen

语种:英文

外文关键词:Computation theory - Cryptography - Formal methods - Intelligent computing - Network security - Semantics

摘要:The paper researches the typical logic verification methods of security protocols and points out their limitations. Most of them are lack of formal semantics and analysis ability to hybrid cryptography-based primitives. In response on the above-mentioned problems, the paper proposes a new logic verification method, which can analyze most of the known security properties of the e-commerce protocols, such as authentication, secrecy of key, non-repudiation, accountability, fairness and atomicity. The validation of the new logic is verified by analyzing the anonymous e-cash payment protocol and certificated E-mail delivery protocol. The analysis results reveal that the two protocols cannot satisfy the intended security goals. ?2010 IEEE.

参考文献:

正在载入数据...

版权所有©河南财经政法大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心