Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model

被引:0
|
作者
Li, Zimao [1 ]
Meng, Bo [1 ]
Wang, Dejun [1 ]
Chen, Wei [1 ]
机构
[1] School of Computer, South-Central University for Nationalities, Min Yuan Road No. 708, Hong Shan Section, Wuhan, Hubei, China
来源
Journal of Software Engineering | 2015年 / 9卷 / 01期
关键词
Abstract specifications - Automatic verification - Computational model - Cryptographic security - [!text type='JAVA']JAVA[!/text] - Mechanized verifications - Protocol implementation - Security protocols;
D O I
10.3923/jse.2015.1.32
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 32
相关论文
共 50 条
  • [41] Session Layer Security Enhancement Using Customized Protocol and Strong Cryptographic Mechanism
    Jain, Aaditya
    Nama, Sunil
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 637 - 644
  • [42] Cryptographic protocol logic for analyzing a variety of security properties and its formal semantics
    Chen, Li
    Li, Xiangdong
    International Journal of Advancements in Computing Technology, 2012, 4 (11) : 283 - 293
  • [43] Mobile agent security through multi-agent cryptographic protocols
    Stephen, K
    Xu, K
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 462 - 468
  • [44] Soundness conditions for cryptographic algorithms and parameters abstractions in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 31 - 38
  • [45] Border Crossing Security and Privacy in Biometric Passport using Cryptographic Authentication Protocol
    Prabhusundhar, P.
    Kumar, V. K. Narendira
    Srinivasan, B.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [46] A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm
    Liu, Zechao
    Liang, Tao
    Lyu, Jiazhuo
    Lang, Dapeng
    Computer Communications, 2024, 221 : 1 - 9
  • [47] A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm
    Liu, Zechao
    Liang, Tao
    Lyu, Jiazhuo
    Lang, Dapeng
    COMPUTER COMMUNICATIONS, 2024, 221 : 1 - 9
  • [48] A Formal Model for Checking Cryptographic API Usage in Java']JavaScript
    Mitchell, Duncan
    Kinder, Johannes
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 341 - 360
  • [49] Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security
    Priya, A.
    Saradha, S.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 (02): : 1785 - 1800
  • [50] Design and Cryptographic Implementation of an Evolutionary Digital Chaotic Model
    Zheng, Jun
    Qian, Yining
    Wang, Chenyu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (12) : 12510 - 12523