Computer Science ›› 2014, Vol. 41 ›› Issue (12): 112-117.doi: 10.11896/j.issn.1002-137X.2014.12.024
Previous Articles Next Articles
LIU Wei,GUO Yuan-bo,LEI Xin-feng and LI Jun-feng
[1] Burrows M,Abadi M,Needham R.A logic of authentication[J].Mathematical and Physical Sciences,1989,426(1871):233-271 [2] Vigano L.Automated Security Protocol Analysis With theAVISPA Tool[J].Electronic Notes in Theoretical Computer Science,2006,155:61-86 [3] Paulson L C.The inductive approach to verifying cryptographic protocols[J].Journal of computer security,1998,6(1):85-128 [4] Fábrega F J T,Herzog J C,Guttman J D.Strand spaces:Proving security protocols correct[J].Journal of computer security,1999,7(2):191-230 [5] Bella G.What is correctness of security protocols?[J].Journal of Universal Computer Science,2008,4(12):2083-2106 [6] Khoury P,Hacid M,Sinha S K,et al.A Study on recent trends on integration of security mechanisms[M]∥Ras Z W,Dardzinska A.Advances in Data Management.Berlin:Springer-Verlag,2009:203-224 [7] Mathuria A,Singh A R,Sharavan P V,et al.Some new multi- protocol attacks[C]∥Proc of the 15th Int Conf on Advanced Computing and Communications.Washington:IEEE Computer Society Press,2007:465-471 [8] Genge B,Haller P.A Syntactic Approach for Identifying Multi-Protocol Attacks[C]∥Ultra Modern Telecommunications and Workshops.Washington:IEEE Computer Society Press,2009:1-5 [9] 杨元原,马文平,刘维博,等.有效的多协议攻击自动化检测系统[J].重庆大学学报,2012,5(2):71-77 [10] Song D,Perrig A,Berezin S.Athena:a novel approach to efficient automatic security protocol analysis[J].Journal of Computer Security,2001,9(1):47-74 [11] Song D.An Automatic Approach for Building Secure Systems[D].Berkeley:University of California at Berkeley,2002 [12] Lowe G.A hierarchy of authentication specifications[C]∥Proc of The 10th Computer Security Foundations Workshop.Wa-shington:IEEE Computer Society Press,1997:31-43 [13] Security protocols open repository[EB/OL].2012-02-11[2013-11-17].http://www.lsv.ens-cachan.fr/Software/spore/table.html |
No related articles found! |
|