Breaking and fixing the Helsinki protocol using SMV

被引:1
|
作者
Zhang, YQ [1 ]
Xiao, GZ [1 ]
机构
[1] Xidian Univ, Inst Informat Secur, Xian 710071, Peoples R China
关键词
D O I
10.1049/el:19990836
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An analysis is made of the Helsinki protocol using SMV, a model checker. The results show that the Horng-Hsu attack is the only successful attack on the protocol, and a new modified Helsinki protocol is proposed which is immune to the attack and better than the previous revised Helsinki protocol.
引用
收藏
页码:1239 / 1240
页数:2
相关论文
共 50 条
  • [41] Primary reconstruction of orbital fractures using patient-specific titanium milled implants: the Helsinki protocol
    Karkkainen, M.
    Wilkman, T.
    Mesimaki, K.
    Snall, J.
    BRITISH JOURNAL OF ORAL & MAXILLOFACIAL SURGERY, 2018, 56 (09): : 791 - 796
  • [42] Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 61 - 75
  • [43] Voluntary cutbacks and pretreaty behavior: The Helsinki protocol and sulfur emissions
    Murdoch, JC
    Sandler, T
    PUBLIC FINANCE REVIEW, 1997, 25 (02) : 139 - 162
  • [44] Difficult airway management protocol. Involvement of the Declaration of Helsinki
    Valero, R.
    Sabate, S.
    Borras, R.
    Anez, C.
    Bermejo, S.
    Gonzalez-Carrasco, F. J.
    Andreu, E.
    Villalonga, R.
    Lopez, A.
    Villalonga, A.
    Masso, E.
    REVISTA ESPANOLA DE ANESTESIOLOGIA Y REANIMACION, 2013, 60 : 34 - 45
  • [45] Permanent Brachial Plexus Birth Injury: Helsinki Shoulder Protocol
    Grahn, Petra
    Poeyhiae, Tiina
    Nietosvaara, Yrjaenae
    SEMINARS IN PLASTIC SURGERY, 2023, 37 (02) : 108 - 116
  • [46] Modeling and verification of embedded systems using Cadence SMV
    Mir, AA
    Balakrishnan, S
    Tahar, S
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 179 - 183
  • [47] Modelling and Verification of Multiple UAV Mission Using SMV
    Sirigineedi, Gopinadh
    Tsourdos, Antonios
    Zbikowski, Rafal
    White, Brian A.
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2010, (20): : 22 - 33
  • [48] 'BREAKS' Protocol for Breaking Bad News
    Narayanan, Vijayakumar
    Bista, Bibek
    Koshy, Cheriyan
    INDIAN JOURNAL OF PALLIATIVE CARE, 2010, 16 (02) : 61 - 65
  • [49] On Establishing and Fixing a Parallel Session Attack in a Security Protocol
    Dojen, Reiner
    Jurcut, Anca
    Coffey, Tom
    Gyorodi, Cornelia
    INTELLIGENT DISTRIBUTED COMPUTING, SYSTEMS AND APPLICATIONS, 2008, 162 : 239 - +
  • [50] Breaking and Fixing Third-Party Payment Service for Mobile Apps
    Shi, Shangcheng
    Wang, Xianbo
    Lau, Wing Cheong
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 3 - 26