Title: | extending the strand space method to verify kerberos v |
Author: | Li Yongjian
; Pang Jun
|
Source: | Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings
|
Conference Name: | 8th International Conference on Parallel and Distributed Computing, Applications and Technologies
|
Conference Date: | DEC 03-06,
|
Issued Date: | 2007
|
Conference Place: | Adelaide, AUSTRALIA
|
Keyword: | Authentication
|
Publisher: | EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS
|
Publish Place: | 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
|
ISBN: | 978-0-7695-3049-9
|
Department: | Li, Yongjian Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing, Peoples R China.
|
Sponsorship: | IEEE S Australian Chapter, Univ Adelaide, SAPAC
|
English Abstract: | In this paper we present two extensions of the strand space method to model Kerberos V First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order t |
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/10956
|
Appears in Collections: | 计算机科学国家重点实验室 _会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
04420201.pdf(177KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Li Yongjian,Pang Jun. extending the strand space method to verify kerberos v[C]. 见:8th International Conference on Parallel and Distributed Computing, Applications and Technologies. Adelaide, AUSTRALIA. DEC 03-06,.
|
|
|