Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model

被引:0
|
作者
Li, Zimao [1 ]
Meng, Bo [1 ]
Wang, Dejun [1 ]
Chen, Wei [1 ]
机构
[1] School of Computer, South-Central University for Nationalities, Min Yuan Road No. 708, Hong Shan Section, Wuhan, Hubei, China
来源
Journal of Software Engineering | 2015年 / 9卷 / 01期
关键词
Abstract specifications - Automatic verification - Computational model - Cryptographic security - [!text type='JAVA']JAVA[!/text] - Mechanized verifications - Protocol implementation - Security protocols;
D O I
10.3923/jse.2015.1.32
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 32
相关论文
共 50 条
  • [21] Cryptographic protocol security analysis based on bounded constructing algorithm
    Xianxian Li
    Jinpeng Huai
    Science in China Series F, 2006, 49 : 26 - 47
  • [22] Cryptographic protocol engineering: Building security from the ground up
    Alves-Foss, J
    IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 371 - 377
  • [23] Cryptographic protocol security analysis based on bounded constructing algorithm
    Li, XX
    Huai, JP
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47
  • [24] Semi-automated verification of security proofs of quantum cryptographic protocols
    Kubota, Takahiro
    Kakutani, Yoshihiko
    Kato, Go
    Kawano, Yasuhito
    Sakurada, Hideki
    JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 192 - 220
  • [25] Formal verification method for cryptographic software security based on Hoare logic
    Xiao K.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (04): : 1301 - 1306
  • [26] Cryptographic construction using coupled map lattice as a diffusion model to enhanced security
    Kumar, Subodh
    Kumar, Rajendra
    Kumar, Sushil
    Kumar, Sunil
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 70 - 83
  • [27] A cryptographic model for branching time security properties - The case of contract signing protocols
    Cortier, Veronique
    Kuesters, Ralf
    Warinschi, Bogdan
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 422 - 437
  • [28] Java and Security Evolving The Security Model
    Roskind, Jim
    Proceedings of the Symposium on Network and Distributed System Security, NDSS 1997, 1997,
  • [29] Security analysis of security protocol Swift implementations based on computational model
    Meng B.
    He X.
    Zhang J.
    Yao L.
    Lu J.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190
  • [30] Security on your hand: Secure filesystems with a "non-cryptographic" JAVA']JAVA-ring
    Weis, R
    Bakker, B
    Lucks, S
    JAVA ON SMART CARDS: PROGRAMMING AND SECURITY, 2001, 2041 : 151 - 162