Design and analysis of cryptographic protocols for RFID

被引:0
|
作者
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
机构
来源
Jisuanji Xuebao | 2006年 / 4卷 / 581-589期
关键词
28;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, D
    [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54
  • [42] Decidable analysis of cryptographic protocols with products and modular exponentiation
    Shmatikov, V
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 355 - 369
  • [43] Automated analysis of cryptographic protocols using Mur phi
    Mitchell, JC
    Mitchell, M
    Stern, U
    [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151
  • [44] Tools for cryptographic protocols analysis: A technical and experimental comparison
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Sisto, Riccardo
    Valenzano, Adriano
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 954 - 961
  • [45] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
    Pankova, Alisa
    Laud, Peeter
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
  • [46] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [47] A problem solving mechanism for formal analysis of cryptographic Protocols
    Han, Jihong
    Zhao, Yu
    Wang, Yadi
    Zhou, Zhiyong
    [J]. NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
  • [48] Automata-based analysis of recursive cryptographic protocols
    Küsters, R
    Wilke, T
    [J]. STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
  • [49] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, David
    [J]. Proceedings of the Computer Security Foundations Workshop, 1999, : 44 - 54
  • [50] Comparative Analysis of Multi-round Cryptographic Primitives based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs
    Kumar, Adarsh
    Jain, Saurabh
    Aggarwal, Alok
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2019, 14 (01): : 1 - 10