[1] |
DUAN Ran, XU Naiyang, HU Aiqun.Research on Authentication Protocol Security Based on Formal Verification Tool[J]. Netinfo Security, 2015, 15(7): 71-76.
|
|
段然,徐乃阳,胡爱群. 基于形式化分析工具的认证协议安全性研究[J]. 信息网络安全,2015,15(7):71-76.
|
[2] |
DOLEV D, YAO A.On the Security of Public Key Protocols[J]. Information Theory IEEE Transactions on, 1983, 29(2): 198-208.
|
[3] |
FABREGA F J T, HERZOG J C, GUTTMAN J D. Strand Space: Proving Security Protocols Correct[J]. Journal of Computer Security, 1999, 7(2-3): 191-230.
|
[4] |
GUTTMAN J D, THAYER F J.Authentication Tests and the Structure of Bundles[J]. Theoretical Computer Science, 2002, 283(2): 333-380.
|
[5] |
PERRIG A, SONG D.Looking for Diamonds in the Desert-extending Automatic Protocol Generation to Three-party Authentication and Key Agreement[C]//IEEE. The 13th IEEE Computer Security Foundations Workshop, July 3-5, 2000, Cambridge, England. New Jersey: IEEE, 2000: 64-76.
|
[6] |
LIU Jiafen, ZHOU Mingtian.Overcome Limitation on Authentication Test[J]. Journal of Software, 2009, 20(10): 2799-2809.
|
|
刘家芬,周明天. 突破认证测试方法的局限性[J]. 软件学报,2009,20(10):2799-2809.
|
[7] |
GUTTMAN J D.State and Progress in Strand Spaces: Proving Fair Exchange[J]. Journal of Automated Reasoning, 2012, 48(2): 159-195.
|
[8] |
YU Lei, Wei Shimin.Aaylysis on Propertions for Principals Keys on Construction of Test Componment[J]. Computer Enginerring and Applications, 2013, 49(6): 114-117.
|
|
余磊,魏仕民,卓泽朋. 协议主体密钥在测试组件和构造上的性质分析[J]. 计算机工程与应用,2013,49(6):114-117.
|
[9] |
MUHAMMAD S.Applying Authentication Tests to Discover Man-in-the-middle Attack in Security Protocols[C]//IEEE. 8th International Conference on Digital Information Management, September 10-12, 2013, Islamabad, Pakistan. New Jersey: IEEE, 2013: 35-40.
|
[10] |
XIONG Ling, PENG Daiyuan.An Improved Authentication Test for Security Protocol Analysis[J]. Communications Technology, 2014, 47(8): 951-954.
|
|
熊玲,彭代渊. 一种改进的安全协议认证测试分析方法[J].通信技术,2014,47(8):951-954.
|
[11] |
RAMSDELL J D, DOUGHERTY D J, GUTTMAN J D, et al.A Hybrid Analysis for Security Protocols with State[C]//Springer. 2014 International Conference on Integrated Formal Methods, September 9-11, 2014, Bertinoro, Italy. Heidelberg: Springer, 2014: 272-278.
|
[12] |
SONG Weitao, HU Bin.One Strong Authentication Test Suitable for Analysis of Nested Encryption Protocols[J]. Computer Science, 2015, 42(1): 149-169.
|
|
宋巍涛,胡斌. 一种适用于嵌套加密协议分析的强认证测试方法[J]. 计算机科学,2015,42(1):149-169.
|
[13] |
FENG Wei, FENG Dengguo.Analyzing Trusted Computing Protocol Based on the Strand Spaces Model[J]. Chinese Journal of Computers, 2015, 38(4): 701-716.
|
|
冯伟,冯登国. 基于串空间的可信计算协议分析[J]. 计算机学报,2015,38(4):701-716.
|
[14] |
LIU Jiafen.Automatic Verification of Security Protolcols with Strand Space Theory[J]. Journal of Computers Applications, 2015, 35(7): 1870-1876.
|
|
刘家芬. 基于串空间理论的安全协议自动验证[J]. 计算机应用,2015,35(7):1870-1876.
|
[15] |
YU Lei, WEI Shimin, JIANG Mingming.Formal Analysis Method of Security Protocol Based on Correlation Degree of Principals[J]. Netinfo Security, 2018, 19(6): 45-51.
|
|
余磊,魏仕民,江明明. 基于主体关联度的安全协议形式化分析方法[J]. 信息网络安全,2018,19(6):45-51.
|
[16] |
YUAN Boao, LIU Jun, ZHOU Haigang.Study and Development on Cryptographic Protocol[J]. Journal of Military Communications Technology, 2017, 38(1): 90-94.
|
|
苑博奥,刘军,周海刚. 密码协义研究与发展[J]. 军事通信技术,2017,38(1):90-94.
|
[17] |
ZHANG Huanguo, WU Fusheng, WANG Houzhen, et al.A Survey: Security Verification Analysis of Cryptographic Protocols Implementations on Real Code[J]. Chinese Journal of Computers, 2017, 40(2): 288-308.
|
|
张焕国,吴福生,王后珍,等. 密码协议代码执行的安全验证分析综述[J]. 计算机学报,2017,40(2):288-308.
|
[18] |
YI Huifan, WAN Liang, HUANG Nana, et al.Research on Attacker Modeling Method of Security Protocol Based on SPIN[J]. Netinfo Security, 2018, 19(2): 61-70.
|
|
易辉凡,万良,黄娜娜,等. 基于SPIN的安全协议的攻击者建模方法研究[J]. 信息网络安全,2018,19(2):61-70.
|