Advanced Search
Volume 26 Issue 4
Apr.  2004
Turn off MathJax
Article Contents
Sun Shao-Jie, Wu Qiong, Li Guo-Hui. Blind Image Deconvolution Algorithm for Camera-shake Deblurring Based on Variational Bayesian Estimation[J]. Journal of Electronics & Information Technology, 2010, 32(11): 2674-2679. doi: 10.3724/SP.J.1146.2009.01600
Citation: Hu Cheng-jun, Zheng Yuan, Lǚ Shu-wang, Shen Chang-xiang. Formal Specification of Security Protocols[J]. Journal of Electronics & Information Technology, 2004, 26(4): 556-561.

Formal Specification of Security Protocols

  • Received Date: 2002-11-28
  • Rev Recd Date: 2003-02-28
  • Publish Date: 2004-04-19
  • In this paper, a specification method using PVS is presented. Higher order logic is chosen as the specification language. Strong spy and ideal encryption are assumed, and trace model is used to define protocols behaviors. Moreover, useful structures such as message, event, protocol rule, etc. are semantically encoded.
  • Needham R M, Schroeder N D. Using encryption for authentication in large network of computers[J].Communications of the ACM.1978, 21(12):993-999[2]Steiner J G, Neuman B C, Schiller J I. Kerberos: an authentication service for open network systems. In Usenix Conference Proceedings, Dallas, Texas, 1988: 191-202.[3]CCITT. CCITT Recommendation X.509, The directory authentication framework, version 7,1987.[4]Owre S, Rushby J, Shankar N, Henke F. Formal verification for fault-tolerant architectures:Prolegomena to the design of PVS. IEEE Trans. on Software Engineering, 1995, SE-21(2): 107-125.[5]Paulson L. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998, 6(1): 85-128.[6]Millen J.[J].H. Rue. Protocol-independent secrecy. In 2000 IEEE Symposium on Security and Privacy, Oakland California, USA, IEEE Computer Society Press.2000,:-[7]Lowe G. A hierarchy of authentication specifications. In Proc. of The 10th Computer Security Foundations Workshop, Rockport, Massachusetts, USA, IEEE Computer Society Press, 1997:31-43.[8]Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Trans. on Computer Systems.1990, 8(1):18-36[9]Guttman J D, Thayer F J. Authentication tests. In 2000 IEEE Symposium on Security and Privacy, Oakland, California, USA, IEEE Computer Society Press, 2000: 96-109.[10]Roscoe A W. Modeling and verifying key-exchange protocols using CSP FDR. In Proc. of the 1995 IEEE Computer Security Foundations Workshop IIX, Dromquinna Manor, Kenmare,County Kerry, Ireland, IEEE Computer Society Press, 1995: 98-107.[11]Thayer J, Herzog J, Guttman J. Strand spaces: Why is a security protocol correct? In Proc. of the 1998 Symposium on Security and Privacy, Oakland California, USA, IEEE Computer Society Press, 1998: 160-171.[12]Paulson L. Isabelle: A Generic Theorem Prover. Berlin, New York: Springer, 1994.[13]胡成军,郑援,沈昌祥.密码协议的秘密性证明.计算机学报,2003,26(3):367-372.
  • Cited by

    Periodical cited type(9)

    1. 张睿敏,张甲艳,陶冶. 变分贝叶斯估计图像滤波去噪算法. 计算机技术与发展. 2021(07): 59-63 .
    2. 郑恩,成耀天,林靖宇. 采用去抖动模糊算法的稠密三维重建. 计算机工程与应用. 2018(01): 217-223 .
    3. 仇翔,戴明. 基于L0稀疏先验的相机抖动模糊图像盲复原. 光学精密工程. 2017(09): 2490-2498 .
    4. 闫敬文,谢婷婷,彭鸿,刘攀华. 基于L_0范数正则项的运动图像去模糊. 激光与光电子学进展. 2017(02): 156-163 .
    5. 杨亚威,李俊山,张士杰,芦鸿雁,胡双演. 基于视觉对比敏感度与恰可察觉失真感知的图像复原. 光学精密工程. 2014(02): 459-466 .
    6. 阮光诗,孙俊喜,孙阳,刘红喜,赵立荣,刘广文. 处理异常值的相机抖动模糊图像复原. 中国图象图形学报. 2014(05): 677-682 .
    7. 吴庆,肖力,孙志刚. 基于运动检测的图像去模糊算法. 计算机与现代化. 2013(12): 110-113 .
    8. 杨敬娴,郭喜庆,孙鹏飞,韩文钦,解官宝. 集成学习法与双分裂Bregman正则化下的图像复原. 微电子学与计算机. 2013(12): 85-89+96 .
    9. 李绍春,初永玲,王枚. 三维旋转运动模糊图像的复原方法研究. 赤峰学院学报(自然科学版). 2012(20): 22-24 .

    Other cited types(33)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2144) PDF downloads(487) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return