期刊文献+

RSA-CEMD协议的分析及基于串空间模型的形式化证明 被引量:1

Analysis of the RSA-CEMD Protocol and the Formal Proof Based on the Strand Space Model
在线阅读 下载PDF
导出
摘要 电子商务协议的最基本任务是保证交易方进行公平交换,而分析交换协议是否保证了公平性就成了分析电子商务协议的关键。本文分析了文献[1]中的挂号电子邮件协议RSA-CEMD协议,指出了其存在的缺陷,对其进行了修改,并对修改后协议的公平性用经过扩展的串空间模型进行了形式化分析。 In this paper,we discuss a certified E-mail delivery protocol proposed by Nenadic.We demonstrate how this protocol cannot achieve fairness,propose a corrected version,and give a formal proof of the correctness in the extended strand space model.
出处 《计算机工程与科学》 CSCD 2007年第2期12-14,23,共4页 Computer Engineering & Science
关键词 公平交换协议 串空间 认证测试 形式化分析 fair exchange protocol,strand space,authentication test,formal analysis
  • 相关文献

参考文献4

  • 1Nenadic A,Zhang N,Barton S.Fair Certified E-mail Delivery[A].Proc of the 2004 ACM Symp on Applied Computing[C].2004.391-396.
  • 2Thayer F J,Herzog J C,Guttman J D.Strand Spaces:Proving Security Protocols Correct[J].Journal of Computer Security,1999,7(2-3):191-230.
  • 3Guttman J D,Thayer F J.Authentication Tests[A].Proc of the 2000 IEEE Symp on Security and Privacy[C].2000.150-164.
  • 4Ray I,Narasimhamurthi N.A Fair Exchange E-Commerce Protocol with Automated Dispute Resolution[A].IFIP Workshop on Database Security[C].2000.27-38.

同被引文献7

  • 1刘璟,祝世雄,周明天.Yahalom协议的串空间模型及分析[J].小型微型计算机系统,2006,27(5):788-792. 被引量:5
  • 2FURQAN Z,MUHAMMAD S,GUHA R K.Formal verification of IEEE 802.11i using strand space formalism[C]// Proceedings of the International Conference on Networking,International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).Washington,DC:IEEE Computer Society Press,2006:140-140.
  • 3THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:why is a security protocol correct[C]// Proceedings of the 1998 IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 4F(A)BREGA F J T,HERZOG J C,GUTTMAN J D.Honest ideals on strand spaces[C]// Proceedings of the 11th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,1998:66-77.
  • 5CHEN J C,JIANG M C,LIU Y W.Wireless LAN security and IEEE 802.11i[J].IEEE Wireless Communications,2005,12(1):27-36.
  • 6SITHIRASENAN E,ZAFAR S,MUTHUKKUMARASAMY V.Formal verification of the IEEE 802.11i WLAN security protocol[C]// Proceedings of the Australian Software Engineering Conference (ASWEC'06).Washington,DC:IEEE Computer Society Press,2006:181-190.
  • 7MISHRA A,ARBAUGH W A.An initial security analysis of the IEEE 802.1x standard[EB/OL].[2007-11-12].http://www.ieee802.org/1/files/public/docs2000/ieee_plenary.pdf.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部