一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

并行攻擊的討論

田建波 鄭東 王育民

田建波, 鄭東, 王育民. 并行攻擊的討論[J]. 電子與信息學報, 1999, 21(4): 557-560.
引用本文: 田建波, 鄭東, 王育民. 并行攻擊的討論[J]. 電子與信息學報, 1999, 21(4): 557-560.
Tian Jianbo, Zheng Dong, Wang Yumin. THE DISCUSSION OF PARALLEL ATTACK[J]. Journal of Electronics & Information Technology, 1999, 21(4): 557-560.
Citation: Tian Jianbo, Zheng Dong, Wang Yumin. THE DISCUSSION OF PARALLEL ATTACK[J]. Journal of Electronics & Information Technology, 1999, 21(4): 557-560.

并行攻擊的討論

THE DISCUSSION OF PARALLEL ATTACK

  • 摘要: 本文從BAN邏輯的語義角度討論了并行攻擊,并提出了對并行攻擊的判斷方法。
  • Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Transacation on Computer Systems.1990, 8(1):18-36[2]Gaarder P, Snekkenes E. Applying a formal analysis technique to CCITT X.509 strong two-way authentication protocol, Journal of Cryptology 1991, (3): 81-98.[3]Boyd C, Mao W. On a Limitations of BAN Logic. In Lecture Notes in Computer Science 765Ad-[4]vances in Cryptology-Eurocrypt93, Lofthus Norway: Springer-Verlag, 1993, 240-247.[5]Wenbo Mao. An augmentation of BAN-like logics. 8th IEEE Computer Security Foundations Workshop, Dromquinna Manor Kenmare County Kerry, Ireland: 1995, 44-58.[6]Paul F. Syverson. A new look at old protocol. Operating System Review, 1997, 31(1): 1-4.[7]Nessett D M. A Critique of Burrows, Abadi and Needham Logic, Operating Systems Review, 1990,24(2): 35-38.[8]Li Gong, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In Pro-[9]ceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California: 1990, 234-248.[10]Abadi M, Tuttle M. A semantics for a logic of authentication. In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, ACM Press, Sanantonio, Texas: 1991, 201-216.[11]Syverson P, Van Oorschot P C. On unifying some cryptographic protocol logics. In Proceeding of 1994 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Okland California: 1994.[12]Van Oorschot P C. Extending cryptographic logics of belief to key agreement protocols (Extended Abstract). In Proceeding of the First ACM Conference on Computer and Communications Secu-[13]rity, Faixfax Virginia: 1993, 232-243.[14]Wedel G, Kessler V. Formal semantics for authentication logics. Computer Security-[15]ESORICS96, United Kingdom: 1996, 219-239.[16]Kesser V, Wedel G. AUTOLOG-An Advanced Logic of Authentication. Proc. of the Computer[17]Security Foundations Workshop VII, Franconia, IEEE Computer Society Press. New Hampshire: 1990,90-94.
  • 加載中
計量
  • 文章訪問數(shù):  1999
  • HTML全文瀏覽量:  145
  • PDF下載量:  433
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  1997-12-16
  • 修回日期:  1998-12-11
  • 刊出日期:  1999-07-19

目錄

    /

    返回文章
    返回