The Verification Logic for Secure Protocols
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    In this paper,a non-monotonic dynamic logic that verifies properties of security protocols is introduced.In accordance with the specific requirement of information security,it provides axioms and inference rules about various cryptographic operations such as encryption,decryption,signature,authentication and key assignment.Several instances are given to illustrate its applications in security protocol verification.Open problems for further study are also discussed.

    Reference
    Related
    Cited by
Get Citation

白硕,隋立颖,陈庆锋,付岩,庄超.安全协议的验证逻辑.软件学报,2000,11(2):213-221

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:April 03,1998
  • Revised:March 22,1999
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063