一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

關(guān)于BAN邏輯擴(kuò)展的注記

鄭東 田建波 王育民

鄭東, 田建波, 王育民. 關(guān)于BAN邏輯擴(kuò)展的注記[J]. 電子與信息學(xué)報(bào), 2000, 22(1): 73-77.
引用本文: 鄭東, 田建波, 王育民. 關(guān)于BAN邏輯擴(kuò)展的注記[J]. 電子與信息學(xué)報(bào), 2000, 22(1): 73-77.
Zheng Dong, Tian Jianbo, Wang Yumin. A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 73-77.
Citation: Zheng Dong, Tian Jianbo, Wang Yumin. A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 73-77.

關(guān)于BAN邏輯擴(kuò)展的注記

A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS

  • 摘要: 本文指出了W.Mao(1995)對(duì)其協(xié)議(1)的證明中存在的錯(cuò)誤,并對(duì)其在協(xié)議理想化過程中提出的N-u規(guī)則作了探討,指出其擴(kuò)展N-u的三條規(guī)則的缺陷,并作了改進(jìn),最后,給出一個(gè)例子說明N-u規(guī)則的應(yīng)用。
  • Butrrows M,Abadi M,Needham R A logic of authentication,Technical Report SRC Technical Report 39,Digital Equipment Corporation,F(xiàn)ebruary 1998.[2]Abadi M,Tuttle M R.A semantics for a logic of authentication (extended abstract).In Proceedings of Tenth Annual ACM Symposium on Principles of Disttributed Computing, At Montreal,Quebec,Canada:August 199l,20l-216.[3]Syverson P,Van Oorschot P C.On unifying some cryptographic protocol logics.In Proceeding of 1994 IEEE Symposium on Security and Privacy Oakland,California:IEEE Computer Society Ptess,1994,165-177.[4]Mao W,Boyd C Development of authentication protocols:Some misconceptions and a new approach.In Proceedings of Computer Security Foundations Workshop VII.Franconia:IEEE Computer Society Press,1994,178-186.[5]Mao W An augmentation of BAN-like logics,In Proceeding of IEEE Computer Society Symposium on Research in Security and Privacy Oakland,California:1995,44-56.[6]Gong L.Needham R,Yahalom R.Reasoning about belief in cryptographic protocols,In Proceedings of the l990 IEEE Symposium on Research in Security and Privacy,Oakland,California:1990,234-248.[7]Kesser V,Wedel G,AUOLOG-An advanced logc of anthentication.Proc,of the computer Security Foundations Workshop VII, Franconia:IEEE computer society Press 1994,90-99.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  2040
  • HTML全文瀏覽量:  93
  • PDF下載量:  403
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  1997-10-24
  • 修回日期:  1999-03-01
  • 刊出日期:  2000-01-19

目錄

    /

    返回文章
    返回