Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2010-12
Add to Favorite Get Latest Update

A New Analysis Method of NS Public-key Proctocol

LIU Yu-kun,ZHAO Wei-ting(College of Software Pingdingshan University,Pingdingshan 467000,China)  
It is an important and hard problem in the area of computer network security to analyze cryptographic protocols.A methodology of NS public-key proctocol is presented based on functional programming language Haskell.When formaling the model,Dolev-Yao intruder model is assumed,and based on state transition system,message and events are semantically encoded,security properties are described by event sets.It proposes inspection strategy for security properties.The features of lazy evaluation of Haskell have solved some key problems which are formal specifications for security protocols with this analysis method,which successfully find the Man-in-the-Middle Attack.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 6 Hits
1 FU Yu,MA Zitang,WANG Huifang (College of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004);Research and Application for Combination Analysis Technology of Security Protocol Formal[J];计算机工程;2006-17
2 Pang Jianmin1,2 Zhao Rongcai1 Wang Qian3 1(Institute of Information Engineering,University of Information Engineering,Zhengzhou 450002) 2(University of Durham,Durham,UK,DH1 3LE) 3(Institute of Surveying and Mapping,University of Information Engineering,Zhengzhou 450052);The Features of Lazy Evaluation of Haskell and their Applications[J];计算机工程与应用;2006-10
3 PANG Jian--Min;ZHAO Rong-Cai;WANG Huai-Min Institute of Information Engineering, University of Information Engineering,Zhengzhou450002 School of Computer Science, National University of Defense Technology, Changsha410073 University of Durham, Durham, DH1 3LE, UK;The Higher-order Features of Haskell and their Applications[J];计算机科学;2005-06
4 Pang Jianmin1,2 Zhao Rongcai1 1(Institute of Information Engineering,University of Information Engineering,Zhengzhou 450002) 2(University of Durham,Durham,UK,DH1 3LE);The Features of List Comprehensions of Haskell and their Applications[J];计算机工程与应用;2005-04
5 RONG Mei ZHANG Guang-Quan (Tourism College, Jinan University, Shenzhen 518053) (College of Computer Science and Technology,Suzhou University,Suzhou 215006) (Key Lab for Computer Science, Institute of Software, Chinese Academy of Sciences,Beijing 100080);New Approaches for Model Checking[J];计算机科学;2003-05
6 ZHANG Yu-qing 1,2 WANG Lei2 XIAO Guo-zhen2 WU J ian-ping1 1(Network Research Center\ Tsinghua University Beijing 100084) 2(Information Security Institute Xidian University Xi'an 710071);Model Checking Analysis of Needham-Schroeder Public-Key Protocol[J];软件学报;2000-10
China Proceedings of conference Full-text Database 1 Hits
1 ;Formal Analysis of Security Protocols Based on Model Checker SPIN[A];[C];2005
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Chun-yan;SUN Jun;Wuxi Professional College of Science and Technology;Jiangnan University;;Validation for Probability Real-time System with Data Constraints[J];计算机科学;2017-S1
2 LI Guo-zheng;GAO Zheng;School of Computer Science and Technology,Nanjing University of Aeronautics & Astronautics;;An Approach of Bisimulation Checking for Real-time System Based on Data Constraints[J];计算机技术与发展;2016-01
3 YUAN Hong-lin;BAO Zhi-hua;YAN Yan;School of Electronics and Information, Nantong University;School of Computer Science and Technology, Nantong University;;Information monitor method of RFID system based on logarithm spectrum RF fingerprint identification[J];通信学报;2014-07
4 Luo Yan;;The theory of functional programming technology in the application of computer mathematics teaching[J];网络安全技术与应用;2014-05
5 NI Shui-mei;CAO Zi-ning;LI Xin-lei;National Key Laboratory of Civil Aircraft Flight Simulation;College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics;College of Computer Science,Anhui University of Technology;;Model Checking for Real-time Systems with Data Constraints[J];计算机科学;2014-05
6 Hua Xiyao;Su Boni;Chen Liping;Gao Xianqiang;College of Information Engineering,Tarim University;College of Information Engineering,Shanghai Maritime University;;A Survey of Model Checking[J];塔里木大学学报;2013-04
7 XU Xiao-li(School of Computer Science,Beijing University of Aeronautics and Astronautics,Beijing 100191,China);Research on System Modeling Based on SPIN[J];计算机与现代化;2012-09
8 ZHANG Lei1,MA Guang-sheng2,XIU Jian-xin1(1.Department of Computer Science and Electric Engineering,East University of Heilongjiang,Harbin 150086,China;2.College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China);Equivalent Model Verification of Task Network to Timed Automata[J];计算机工程;2012-13
9 YU Xian-feng1,WANG Hui2(1.Department of Computer Science,Shangluo University,Shangluo,Shaanxi 726000;2.Department of Mathematics and Computational Science,Shangluo University,Shangluo,Shaanxi 726000);Formal Verification of Mutex of Concurrent System[J];商洛学院学报;2011-06
10 ZHANG Xiao(College of Textile Engineering and Art,Taiyuan University of Technology,Jinzhong 030600,China);Improvement of Kerberos protocol based on PKI[J];信息技术;2011-10
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Pang Jianmin1,2 Zhao Rongcai1 1(Institute of Information Engineering,University of Information Engineering,Zhengzhou 450002) 2(University of Durham,Durham,UK,DH1 3LE);The Features of List Comprehensions of Haskell and their Applications[J];计算机工程与应用;2005-04
2 ZHANG Yu qing,LI Ji hong,XIAO Guo zhen (Research Inst. of Information Security, Xidian Univ., Xi′an 710071, China);BAN logic for cryptographic protocols analysis and its limitations[J];西安电子科技大学学报;1999-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved