Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 477-480.doi: 10.11896/jsjkx.200500072
• Information Security • Previous Articles Next Articles
CAI Yu-tong1, WANG Yong1, WANG Ran-ran1, JIANG Zheng-tao2, DAI Gui-ping3
CLC Number:
[1] ZAJAC B P.Applied cryptography:Protocols, algorithms, and source code in C[J].Computers & Security,1994,13(3):217-218. [2] OROS H,BOIAN F.Spi calculus analysis of Otway-Rees protocol[J].International Journal of Computers,Communications & Control (IJCCC),2008,3(3):427-432. [3] Fokkink.Introduction to Process Algebra[J].Texts in Theoretical Computer Science An Eatcs,2000:1-163. [4] VAGLINI G.Communication and concurrency:R Milner Prentice Hall (1989) 260pp 17.95 softback[J]. Information and Software Technology,1991,33(6):462. [5] HOARE T,O'HEARN P.Separation Logic Semantics for Communicating Processes[J].Electronic Notes in Theoretical Computer Science,2008,212:3-25. [6] BERGSTRA J A,KLOP J W.Algebra of communicating processes with abstraction[J].Theoretical Computer Science,1985,37(85):77-121. [7] 王勇,许荣强,任兴田,等.可信计算中信任链建立的形式化验证[J].北京工业大学学报,2016,42(3):73-78. [8] 王勇,方娟,任兴田,等.基于进程代数的TCG远程证明协议的形式化验证[J].计算机研究与发展,2013(2):103-109. |
[1] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[2] | NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303. |
[3] | DONG Qi-ying, SHAN Xuan, JIA Chun-fu. Impact of Zipf's Law on Password-related Security Protocols [J]. Computer Science, 2020, 47(11): 42-47. |
[4] | SONG Lan, XUE Jin-yun, HU Qi-min, XIE Wu-ping, JIANG Dong-ming and YOU Zhen. Research of Automatic Verification Method about Radio Frequency Identification Protocol [J]. Computer Science, 2017, 44(9): 99-104. |
[5] | LIN Lei-lei, ZHOU Hua, DAI Fei, HE Zhen-li, SHEN Yong and KANG Hong-wei. Method of Software Architecture Refinement Based on Algebraic Semantics [J]. Computer Science, 2017, 44(7): 141-146. |
[6] | LIAO Yong, FAN Zhuo-chen and ZHAO Ming. Survey on Security Protocol of Space Information Networks [J]. Computer Science, 2017, 44(4): 202-206. |
[7] | ZHENG Ming, LI Tong, LIN Ying, ZHOU Xiao-xuan, LI Xiang and MING Li. Dynamic Evolution Consistency Verification Method for Component System Modeling [J]. Computer Science, 2017, 44(11): 80-86. |
[8] | LI Xiang, LI Tong, XIE Zhong-wen, HE Yun, CHENG Lei and HAN Xu. Multi-layer Model for SaaS Multi-tenancy [J]. Computer Science, 2017, 44(11): 56-63. |
[9] | LI Zong-hua, ZHOU Xiao-feng, WU Ke-li and CHEN Fu-bing. BPMN Formalization Based on Extended Petri Nets Model [J]. Computer Science, 2016, 43(11): 40-48. |
[10] | FENG Wei-ning, ZHANG Zhi-yong and ZHAO Chang-wei. Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM [J]. Computer Science, 2015, 42(4): 132-135. |
[11] | SONG Wei-tao and HU Bin. One Strong Authentication Test Suitable for Analysis of Nested Encryption Protocols [J]. Computer Science, 2015, 42(1): 149-154. |
[12] | LI Ling,DU Xue-hui and BAO Yi-bao. Research on Optimization Technology of Reconfigurable Security Protocols Based on Reconfigurable Component [J]. Computer Science, 2014, 41(Z11): 245-249. |
[13] | LIU Jing,YE Xin-ming and MA Yuan-fei. Verification and Analysis of SIP Protocol Based on Timed Colored Petri Nets [J]. Computer Science, 2014, 41(7): 122-129. |
[14] | ZHANG Wei. Axiomatizing Weak Covariant-contravariant Simulation Semantics [J]. Computer Science, 2014, 41(11): 99-102. |
[15] | ZHU Rui,LI Tong,MO Qi,ZHANG Xuan,WANG Yi-quan,LIN Lei-lei and DAI Fei. Research on Deviation Diagnostic of Software Process Behavior Based on EPMM Modelling [J]. Computer Science, 2014, 41(11): 56-62. |
|