Computer Science ›› 2018, Vol. 45 ›› Issue (7): 143-149.doi: 10.11896/j.issn.1002-137X.2018.07.024
• Information Security • Previous Articles Next Articles
YUAN Bo-ao, LIU Jun
CLC Number:
[1]FENG D G,FAN H.Survey on Theories and Methods of Formal Analysis for Security Protocols[J].Journal of the Graduate School of the Chinese Academy of Sciences,2003,20(4):389-406.(in Chinese) 冯登国,范红.安全协议形式化分析理论与方法研究综述[J].中国科学院研究生院学报,2003,20(4):389-406. [2]ZHOU J,GOLLMAN D.A fair non-repudiation protocol[C]∥Proceedings of the 1996 IEEE Symposium on Security and Privacy.Oakland:IEEE Computer Society Press,1996:55-61. [3]KREMER S,MARKOWITCH O.A multi-party non-repudiation protocol[C]∥15th International Conference on Information Security(SEC 2000).Beijing:Kluwer,2000:271-280. [4]KREMER S,MARKOWITCH O.Fair multi-party non-repudiation protocols[J].International Journal of Information Security,2003,1(4):223-235. [5]ONIEVA J A,ZHOU J,CARBONELL M,et al.A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages[M].Boston:Springer,2003:37-48. [6]HAN Z G,LUO J Z.Analysis and Improvement of Timeliness ofa Multi-Party Non-Repudiation Protocol[J].Acta Electronica Sinica,2009,37(2):377-381.(in Chinese) 韩志耕,罗军舟.多方不可否认协议时限性分析与改进[J].电子学报,2009,37(2):377-381. [7]WANG X,WANG X.Formal Analysis Of Multi-party Non-repudiation Protocols Without TTP[C]∥International Conference on Communications and Intelligence Information Security.Nanning:IEEE Computer Society Press,2010:96-99. [8]WANG X M,WENG L C.Analysis and Improvement of A Fair Multi-party Non-repudiation Protocol Based on ATL Logic[J].Information Security and Technology,2011,2(9):21-25.(in Chinese) 汪学明,翁立晨.基于ATL逻辑的公平多方不可否认协议的分析与改进[J].信息安全与技术,2011,2(9):21-25. [9]LI L,WANG L,CHEN J,et al.Fairness Analysis for Multiparty Nonrepudiation Protocols Based on Improved Strand Space[J].Discrete Dynamics in Nature & Society,2014,17(1):1-7. [10]SYVERSON P F,VAN O P C.A Unified Cryptographic Protocol Logic[R].Washington:Naval Research Lab,1996. [11]LEI X F,XUE R.The Logic Methods of Cryptographic Protocol Analysis[M].Beijing:Science Press,2013:154-159.(in Chinese) 雷新锋,薛锐.密码协议分析的逻辑方法[M].北京:科学出版社,2013:154-159. [12]WANG Y M.The Application Study on Formalism of Multi-Party Non-Repudiation Protocols on SVO Logic[D].Guiyang:Guizhou University,2009.(in Chinese) 王远敏.基于SVO逻辑的多方不可否认协议的形式化分析与研究[D].贵阳:贵州大学,2009. [13]HE B,LI X J,XIA C H,et al.A Fair Multi-Party Non-Repudiation Protocol[J].Computer Engineering and Applications,2005,41(27):120-122.(in Chinese) 何冰,李肖坚,夏春和,等.公平的多方不可否认协议[J].计算机工程与应用,2005,41(27):120-122. [14]HAN Z G,LUO J Z.A Fair Multi-Party Non-Repudiation Protocol[J].Chinese Journal of Computers,2008,31(10):1705-1715.(in Chinese) 韩志耕,罗军舟.一个公平的多方不可否认协议[J].计算机学报,2008,31(10):1705-1715. |
[1] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[2] | PENG Dong-yang, WANG Rui, HU Gu-yu, ZU Jia-chen, WANG Tian-feng. Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos [J]. Computer Science, 2022, 49(4): 312-320. |
[3] | JIANG Rui, YIN Hui, XU You-yun. Millimeter-wave Beamforming Scheme Based on Location Fairness Guarantee for HSR Communications [J]. Computer Science, 2020, 47(10): 269-274. |
[4] | GUO Li-juan, LV Xiao-lin. Optimistic Certified Email for Line Topology [J]. Computer Science, 2018, 45(8): 156-159. |
[5] | WANG Zhen-chao,ZHAO Yun,XUE Wen-ling. Power Control Based on Fairness in D2DUnderlaid Cellular Networks [J]. Computer Science, 2018, 45(7): 104-109. |
[6] | LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao. Design and Simulation of Fair Data Exchange Protocol with Bounded Rationality [J]. Computer Science, 2018, 45(11): 115-123. |
[7] | GUO Zi-rong, ZENG Hua-xin and DOU Jun. Simple and Smoothed Fair Round Robin Scheduling Algorithm [J]. Computer Science, 2016, 43(1): 122-127. |
[8] | LIU Hai, PENG Chang-gen, ZHANG Hong and REN Zhi-jing. Game Logic Formal Model of Rational Secure Protocol [J]. Computer Science, 2015, 42(9): 118-126. |
[9] | SHI Zhou-qi,DING Zhi-jun and CHEN Hong-zhong. Further Study of Relationship between Weak Fairness and Fairness of Petri Nets [J]. Computer Science, 2014, 41(7): 49-51. |
[10] | SUN Yue,YU Jiong and ZHU Jian-bo. Preemptive Scheduling for Multiple DAGs in Cloud Computing [J]. Computer Science, 2014, 41(3): 145-148. |
[11] | GUO Jun-xia,GAO Cheng,XU Nan-shan and LU Gang. User Behavior Analysis Based on Web Browsing Logs [J]. Computer Science, 2014, 41(3): 110-115. |
[12] | FENG Yun-zhi and ZHANG En. Millionaires’ Protocol Based on Game Theory [J]. Computer Science, 2014, 41(12): 129-132. |
[13] | LIU Gui-kai and GAO Lei. RQRR:A New Fair and Efficient Packet Scheduling Algorithm [J]. Computer Science, 2013, 40(8): 72-78. |
[14] | LIU Jian-hui,WANG Jun,JI Chang-peng and WANG Yang. Balanced Algorithm to Suppress Free-riding in P2P Network [J]. Computer Science, 2013, 40(7): 36-39. |
[15] | LUO Qing-yun,CHEN Min and ZHAO Jin-guo. Cooperative Channel Allocation Strategy Based on Balancing Algorithm [J]. Computer Science, 2013, 40(4): 96-101. |
|