Design and analysis of cryptographic protocols for RFID

被引:0
|
作者
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
机构
来源
Jisuanji Xuebao | 2006年 / 4卷 / 581-589期
关键词
28;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [2] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    [J]. IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [3] Noisy cryptographic protocols for low-cost RFID tags
    Chabanne, Herve
    Fumaroli, Guillaume
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (08) : 3562 - 3566
  • [4] Protocol engineering principles for cryptographic protocols design
    Dong, Ling
    Chen, Kefei
    Wen, Mi
    Zheng, Yanfei
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 641 - +
  • [5] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [6] Some applications of polynomials for the design of cryptographic protocols
    Kushilevitz, E
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
  • [7] Non interference for the analysis of cryptographic protocols
    Focardi, R
    Gorrieri, R
    Martinelli, F
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
  • [8] Cryptographic Protocols Analysis in Event B
    Benaissa, Nazim
    Mery, Dominique
    [J]. PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
  • [9] A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 194 (01) : 61 - 83
  • [10] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85