高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

并行攻击的讨论

田建波 郑东 王育民

田建波, 郑东, 王育民. 并行攻击的讨论[J]. 电子与信息学报, 1999, 21(4): 557-560.
引用本文: 田建波, 郑东, 王育民. 并行攻击的讨论[J]. 电子与信息学报, 1999, 21(4): 557-560.
Tian Jianbo, Zheng Dong, Wang Yumin. THE DISCUSSION OF PARALLEL ATTACK[J]. Journal of Electronics & Information Technology, 1999, 21(4): 557-560.
Citation: Tian Jianbo, Zheng Dong, Wang Yumin. THE DISCUSSION OF PARALLEL ATTACK[J]. Journal of Electronics & Information Technology, 1999, 21(4): 557-560.

并行攻击的讨论

THE DISCUSSION OF PARALLEL ATTACK

  • 摘要: 本文从BAN逻辑的语义角度讨论了并行攻击,并提出了对并行攻击的判断方法。
  • Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Transacation on Computer Systems.1990, 8(1):18-36[2]Gaarder P, Snekkenes E. Applying a formal analysis technique to CCITT X.509 strong two-way authentication protocol, Journal of Cryptology 1991, (3): 81-98.[3]Boyd C, Mao W. On a Limitations of BAN Logic. In Lecture Notes in Computer Science 765Ad-[4]vances in Cryptology-Eurocrypt93, Lofthus Norway: Springer-Verlag, 1993, 240-247.[5]Wenbo Mao. An augmentation of BAN-like logics. 8th IEEE Computer Security Foundations Workshop, Dromquinna Manor Kenmare County Kerry, Ireland: 1995, 44-58.[6]Paul F. Syverson. A new look at old protocol. Operating System Review, 1997, 31(1): 1-4.[7]Nessett D M. A Critique of Burrows, Abadi and Needham Logic, Operating Systems Review, 1990,24(2): 35-38.[8]Li Gong, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In Pro-[9]ceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California: 1990, 234-248.[10]Abadi M, Tuttle M. A semantics for a logic of authentication. In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, ACM Press, Sanantonio, Texas: 1991, 201-216.[11]Syverson P, Van Oorschot P C. On unifying some cryptographic protocol logics. In Proceeding of 1994 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Okland California: 1994.[12]Van Oorschot P C. Extending cryptographic logics of belief to key agreement protocols (Extended Abstract). In Proceeding of the First ACM Conference on Computer and Communications Secu-[13]rity, Faixfax Virginia: 1993, 232-243.[14]Wedel G, Kessler V. Formal semantics for authentication logics. Computer Security-[15]ESORICS96, United Kingdom: 1996, 219-239.[16]Kesser V, Wedel G. AUTOLOG-An Advanced Logic of Authentication. Proc. of the Computer[17]Security Foundations Workshop VII, Franconia, IEEE Computer Society Press. New Hampshire: 1990,90-94.
  • 加载中
计量
  • 文章访问数:  1984
  • HTML全文浏览量:  140
  • PDF下载量:  433
  • 被引次数: 0
出版历程
  • 收稿日期:  1997-12-16
  • 修回日期:  1998-12-11
  • 刊出日期:  1999-07-19

目录

    /

    返回文章
    返回