Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model

被引:0
|
作者
Li, Zimao [1 ]
Meng, Bo [1 ]
Wang, Dejun [1 ]
Chen, Wei [1 ]
机构
[1] School of Computer, South-Central University for Nationalities, Min Yuan Road No. 708, Hong Shan Section, Wuhan, Hubei, China
来源
Journal of Software Engineering | 2015年 / 9卷 / 01期
关键词
Abstract specifications - Automatic verification - Computational model - Cryptographic security - [!text type='JAVA']JAVA[!/text] - Mechanized verifications - Protocol implementation - Security protocols;
D O I
10.3923/jse.2015.1.32
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 32
相关论文
共 50 条
  • [1] Modeling for security verification of a cryptographic protocol with MAC payload
    Wang, HB
    Zhang, YS
    Li, Y
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 538 - 547
  • [2] A cryptographic model for better information security
    Kumar, Sunil
    Kumar, Manish
    Budhiraja, Rajat
    Das, M. K.
    Singh, Sanjeev
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 123 - 138
  • [3] Model based security verification of protocol implementation
    Fu, Yulong
    Kone, Ousmane
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 : 17 - 27
  • [4] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [5] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [6] Improving the Security of Cryptographic Protocol Standards
    Basin, David
    Cremers, Cas
    Miyazaki, Kunihiko
    Radomirovic, Sasa
    Watanabe, Dai
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 24 - 31
  • [7] Improved Cryptographic Model for better Information Security
    Kumar, Sunil
    Kumar, Manish
    Das, M. K.
    Singh, Sanjeev
    Budhiraja, Rajat
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 406 - 410
  • [8] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [9] Cryptographic Protocol Security Verification of the Electronic Voting System Based on Blinded Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 49 - 57
  • [10] Enhancing the Security in Signature Verification for WSN with Cryptographic Algorithm
    Jasmin, U.
    Velayutham, R.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1584 - 1588