Computer Science ›› 2015, Vol. 42 ›› Issue (1): 149-154.doi: 10.11896/j.issn.1002-137X.2015.01.035
Previous Articles Next Articles
SONG Wei-tao and HU Bin
[1] Fabrega F J T,Herzog J C,Guttman J D.Strand space:Why is a security protocol correct[C]∥IEEE Computer Society Press Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland,1998:160-171 [2] Meadows C.Open issues in formal methods for cryptographic protocol analysis[C]∥Proceedings,IEEE DARPA Information Survivability Conference and Exposition.2000,1:237-250 [3] Guttman J D,Thayer F J.Authentication tests[C]∥Procee-dings,2000 IEEE Symposium on Security and Privacy.IEEE Computer Society Press,May 2000:96-109 [4] Guttman J D.Security protocol design via authentication tests[C]∥Proceedings Computer Security Foundations Workshop,2002.15th IEEE.IEEE,2002:92-103 [5] Wang Q,Zhi F H,Ao J H.Design and Security Analysis of Mobile Identity Authentication Protocol[J].Advanced Materials Research,2012,403:2645-2649 [6] Chen N,Jiang R.Security Analysis and Improvement of UserAuthentication Framework for Cloud Computing[J].Journal of Networks,2014,9(1):198-203 [7] Perrig A,Song D.Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement[C]∥Proc.of the 13th Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2000:64-76 [8] Li Y J,Pang J.Generalized unsolicited tests for authenticationprotocol analysis[C]∥IEEE Computer Society Press Proc.of the 7th Int’l Conf.on Parallel and Distributed Computing,Applications and Technologies.2006:509-514 [9] Liu J F,Zhou M T.Research and improvement on authentication test’s limitation[J].High Technology Letters,2008,4(3):266-270 [10] 刘家芬,周明天.突破认证测试方法的局限性[J].软件学报,2009,0(10):2799-2809 [11] Zhang G,Rong M,Fang Y.One extension of authentication test based on strand space model[C]∥Proc.of the 5th International Conference on Wireless Communications,Networking and Mobile Computing.IEEE Press,2009:4506-4509 [12] Zhou Q,Wu X.Extensions to Authentication Test and Its Application[J].Journal of Zhengzhou University (Engineering Science),2010,3:014 [13] Wang Q,Zhi F H,Ao J H.Design and Security Analysis of Mobile Identity Authentication Protocol[J].Advanced Materials Research,2012,403:2645-2649 [14] Muhammad S.Applying authentication tests to discover Man-In-The-Middle attack in security protocols[C]∥Eighth International Conference on Digital Information Management (ICDIM),2013.IEEE,2013:35-40 [15] 余磊,魏仕民.协议主体密钥在测试组件构造上的性质分析[J].计算机工程与应用,2013,49(6):114-117 [16] Khot R A,Srinathan K, Kumaraguru P.A novel Jigsaw based authentication scheme using tagging[C]∥Proc.of the 2011 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.2011:2605-2614 |
No related articles found! |
|