Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Add to Favorite Get Latest Update

Describing the Cryptographic Protocols in Spi Calculus

Department of Computer Science & Engineering, Shanghai Jiaotong University, China  
Spi calculus is an extension of the Pi calculus for the description and analysis of cryptographic protocols. By the increased construct, Spi calculus not only represents the cryptographic protocols explicitly but also authenticates them in a precise semantics.
【CateGory Index】: TP309,
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 ZHOU Zhan fei,ZHOU Dian cui,WANG Gui lin,QING Si han (Institute of Software,The Chinese Academy of Sciences,Beijing 100080,China;Engineering Research Center for Information Security and Technology,The Chinese Academy of Sciences,Beijing 100080,China;Fairness in Electronic Commerce Protocols[J];ACTA ELECTRONICA SINICA;2000-09
2 CHEN Xiao-lin,LI Ji,WEI Ming-liang,LU Sang-lu,CHEN Gui-hai,XIE Li (State Key Laboratory of Novel Software Technology,Nanjing University,Nanjing,Ji angsu 210093,China);Design and Implementation of a Large-Scale Active Reliable Multicast Protocol[J];Acta Electronica Sinica;2001-08
3 Deng Fei et al;Dig ital Sig nature on Windows Crypto API &It's Implementation in MIS[J];Industrial Contral Computer;2002-08
4 SHEN Ming-yu,L Jian-yong,ZHANG You-sheng(School of Computer and Information,Hefei University of Technology,Hefei 230009,China);An active network management system based on the mobile agent and its realization[J];Journal of Hefei University of Technology(Natural Science);2006-04
5 SHEN Ming-yu,WANG Jin-chao,ZHANG You-sheng(School of Computer and Information,Hefei University of Technology,Hefei 230009,China);A loadable library security model and its realization based on SENCOMM[J];Journal of Hefei University of Technology(Natural Science);2006-10
6 XU Bin, QIAN De-Pei, ZHANG Wen-Jie, and LUAN Zhong-Zhi (Department of Computer Science and Technology, Xi'an Jiaotong University, Xi'an 710049);RESEARCH ON ACTIVE NETWORK MANAGEMENT ARCHITECTURE[J];Journal of Computer Research and Development;2002-04
7 Lu Zhenyu Dai Yingxia Lian Yifeng(State Key Lab of Information Security,G raduate School,Chinese Academy of Sciences,Beijing100039);Secure File Transfer Based on PKI[J];Computer Engineering and Applications;2002-11
8 Zeng Xiaoping; Sun Yongqiang(Department of Computer, Shanghai Jiaotong University Shanghai 200030);The Describing and Reasoning of Cryptographic Protocols in Spi Calculus[J];COMPUTER ENGINEERING;1999-02
9 LU Yue-Ming QIAN De-Pei XU Bin WANG Lei (Department of Computer Science and Engineering, Xi′an Jiaotong University, Xi′an 710049);Softnet──An Active Network Based on Mobile Agents[J];Chinese Journal of Computers;2001-11
10 JI Qing-Guang 1),2) FENG Deng-Guo 1) 1) (State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing100080) 2) (Engineering Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing100080);Towards Analyzing Some Kinds of Critically Formal Models for Network Security Protocols[J];Chinese Journal of Computers;2005-07
【Secondary References】
Chinese Journal Full-text Database 5 Hits
1 ZHANG Yu1,YIN Jian-qiang2,HU Jie3(1.Institute of Electronic Technology,Information Engineering University,Zhengzhou Henan 450004,China; 2.Department of Electronic Information,Zhengzhou Electronic Information Specialized Secondary School,Zhengzhou Henan 450100,China; 3.Academic Office,Academy of Armored Forces Engineering,Beijing 100072,China);Research on trust model of universally composable security computation[J];Journal of Computer Applications;2012-05
2 ZHANG Yu1,YIN Jian-qiang2,HU Jie3(1.The 3rd Department,Zhengzhou Institute of Information Science and Technology,Zhengzhou 450004,China;2.Zhengzhou Electronic Information Specialized Secondary School,Zhengzhou 450100,China;3.Academy of Armored Forces Engineering,Beijing 100072,China);Universally Composable Secure Commitment Protocol Based on Tamper-proof Hardware Model[J];Computer Engineering;2013-02
3 WANG Shi-guo,CUI Xin-chun,MA Xiu-feng (College of Information Technology and Communication,Qufu Normal University,Rizhao 276826,China);Design of Buyer-Seller Digital Watermarking Protocol Based on Service-Oriented Architecture Mechanism[J];China Printing and Packaging Study;2013-03
4 LIU Yu-liang , REN Wei (School of Computer Science, China University of Geosciences (Wuhan) , Wuhan Hubei 430074, China);Discussion on Secure Protocol Proof based on Universally Compostable Model[J];Netinfo Security;2012-06
5 LIU Yu-liang,REN Wei(China University of Geosciences,Wuhan Hubei,430074,China);An Mutual Authentication Protocol for RFID based on UC Model[J];Netinfo Security;2012-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved