基于StrandSpace模型的安全协议形式化分析研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

西南交通大学硕士学位论文基于StrandSpace模型的安全协议形式化分析研究姓名:程娜申请学位级别:硕士专业:密码学指导教师:何大可20060501基于StrandSpace模型的安全协议形式化分析研究作者:程娜学位授予单位:西南交通大学参考文献(65条)1.参考文献2.DDolev.AYaoOnthesecurityofpublickeyprotocols[TechnicalReport,No.STAN-CS-81-854,DeptofComputerScience,StanfordUniversity]19813.MBurrows.MAbadi.RNeedhamAlogicofauthentication1990(01)4.GLoweBreakingandfixingtheNeedham-Schroederpublic-keyprotocolusingFDR19965.JCMitchell.MMitchell.USternAutomatedanalysisofcryptographicprotocolsusingmurcp19976.JMillenTheInterrogatormodel19957.RNeedham.MSchroederUsingencryptionforauthenticationinlargenetworkofcomputers1978(12)8.FJavierThayerFabrega.JonathanCHerzog.JoshuaDGuttmanStrandSpaces:Whyisasecurityprotocolcorrect?IEEEComputerPress19989.冯登国.范红安全协议形式化分析理论与方法研究综述[期刊论文]-中国科学院研究生院学报2003(4)10.JavierThayerFabrega.JonathanCHerzog.JoshuaDGuttmanHonestIdealsonStrandSpaces199811.ThayerFJ.HerzogJC.GuttmanJDStrandspaces:Provingsecurityprotocolscorrect1999(2-3)12.ICervesato.NDurgin.MKanovich.A.ScedrovInterpretingStrandsinLinearLogic200013.PaulSyversonTowardsaStrandSemanticsforAuthenticationLogic199914.DXSongAthena:anewefficientautomatedcheckerforsecurityprotocolanalysis199915.RLRivest.AShamir.LAdlemanAmethodforobtainingdigitalsignaturesandpublic-keycryptosystems1978(02)16.MMambo.KUsuda.EOkamotoProxysignatures:Delegationofthepowertosignmessage1996(09)17.YiLJ.BaiGQ.XiaoGZProxymulti-signaturescheme:Anewtypeofproxysignaturescheme2000(06)18.祁明.L.Harn基于离散对数的若干新型代理签名方案[期刊论文]-电子学报2000(11)19.WangX.FuFCryptanalysisofaproxymultisignaturescheme2002(04)20.StefanosGritzalis.DiomidisSpinellisCryptographicprotocolsoveropendistributedsystems:Ataxonomyofflawsandrelatedprotocolanalysistools199721.MillerSP.NeumanC.SchillerJI.SaltierJHKerberosauthenticationandauthorizationsystem.ProjectAthenaTechnicalPlanSectionE.2.1198722.CCITTCCITTdraftrecommendationX.509.TheDirectory-AuthenticationFramework198723.ClarkJ.JacobJAsurveyofauthenticationprotocolliterature:Version1.0199724.ISO.EECInformationtechnologyandsecuritytechniques.entityauthenticationmechanismspart2:Entityauthenticationusingsymmetrictechniques199325.SatyanarayananMIntegratingsecurityinalargedistributedsystem[TechnicalReport,CMU-CS,CMU]198726.ISO.IECInformationtechnologyandsecuritytechniques.entityauthenticationmechanismspart4:Entityauthenticationusingcryptographiccheckfunctions199327.RNeedham.MSchroederUsingencryptionforauthenticationinlargenetworksofcomputers1978(12)28.OtwayD.ReesOEfficientandtimelymutualauthentication1987(01)29.李先贤.怀进鹏分布式网络环境下密码协议形式模型和安全性[期刊论文]-中国科学院研究生院学报2002(3)30.DenningD.SaccoGTimestampsinkeydistributionprotocols1981(08)31.WooT.LamSAlessononauthenticationprotocoldesign1994(03)32.NeumanBC.StubblebineSGAnoteontheuseoftimestampsasnonces1993(02)33.KaoIL.ChowRAnefficientandsecureauthenticationprotocolusinguncertifiedkeys1995(03)34.ISO.IECInformationtechnologyandsecuritytechniques.entityauthenticationmechanismspart3:Entityauthenticationusingapublickeyalgorithm199535.DiffieW.HellmanMENewdirectionsincryptography1976(06)36.MakotoTatebayashi.NatsumeMatsuzaki.NewmanJrKeyDistributionProtocolforDigitalMobileCommunicationSystems199037.NessetDACritiqueoftheBANLogic1990(02)38.GongLOptimalAuthenticationProtocolsResistanttoPasswordGuessingAttacks199539.TardoJ.AlagappanKSPX:GlobalAuthenticationUsingPublicKeyCertificates199140.BellovinS.MerrittMEncryptedKeyExchange:Password-BasedProtocolsSecureagainstDictionaryAttacks199241.GongL.LomasM.NeedhamR.SaltzerJProtectingPoorlyChosenSecretsfromGuessingAttacks1993(05)42.ShamirA.RivestR.AdlemanL.MentalPokerMITLaboratoryforComputerScience[ReportTM-125]197843.CarlsenUCryptographicProtocolFlaws199444.CMeadowsAppyingFormalMethodstotheAnalysisofaKeyManagementProtocol199245.DLongley.SRigbyAnAutomaticSearchforSecurityFlawsinKeyManagementSchemes1992(01)46.LCPaulsonProvingpropertiesofsecurityprotocolsbyinduction199747.GLoweAnattackontheNeedham-Schroederpublickeyauthenticationprotocol1995(03)48.PFSyverson.PCvanOorschotOnUnifiedSomeCryptographicProtocolLogics199449.MAbadi.MRTuttleASemanticforaLogicofAuthentication199150.RKailarAccountabilityinElectronicCommerceProtocols1996(05)51.DKindredTheoryGenerationforSecurityProtocols199952.SchneiderSVerifyingauthenticationprotocolswithCSP199753.CMeadowsAModelofComputationfortheNRLProtocolAnalyzer199454.ThomasYCWoo.SimonSLamAuthenticationforDistributedSystems1992(01)55.GavinLowe.BillRoscoeUsingCSPtoDetectErrorsintheTMNProtocol1997(10)56.GavinLoweTowardsacompletenessresultformodelcheckingofsecurityprotocols[TechnicalReport1998/6,Dept.ofMathematicsandComputerScience,UniversityofLeicester]199857.张少武.郭建胜一个传输模型的认证协议设计[期刊论文]-计算机应用研究2004(5)58.MedvinskyG.NeumanBCNetcash:ADesignofPracticalElectronicCurrencyontheInternet199359.谢晓尧.张焕国基于有穷自动机模型的电子商务协议的公平性分析200460.范红.冯登国安全协议理论与方法200361.WilliamStallings.杨明.胥光辉.齐望东密码编码学与网络安全:原理与实践200162.SteveBumett.StephenPains.冯登国密码工程实践指南200163.BruceSehneier应用密码学-协议、算法和C源程序200064.AndrewSTanenbaum.熊桂喜.王小虎计算机网络199865.冯登国.裴定一密码学导引1999本文链接:授权使用:上海海事大学(wflshyxy),授权号:1d996d3c-b464-4ff9

1 / 73
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功