中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
题名:
using spin to model cryptographic protocols
作者: Li YJ ; Xue R
会议名称: International Conference on Information Technology - Coding and Computing
会议日期: APR 05-07,
出版日期: 2004
会议地点: Las Vegas, NV
出版者: ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS
出版地: 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
收录类别: istp
ISBN: 0-7695-2108-8
部门归属: Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China.
主办者: IEEE Comp Soc
英文摘要: We explore the useof Spitz to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruders knowledge, and so on. Based on this, we develop a general method to
语种: 英语
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/13038
Appears in Collections:软件所图书馆_会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
01286745.pdf(1364KB)----限制开放-- 联系获取全文

Recommended Citation:
Li YJ,Xue R. using spin to model cryptographic protocols[C]. 见:International Conference on Information Technology - Coding and Computing. Las Vegas, NV. APR 05-07,.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Li YJ]'s Articles
[Xue R]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Li YJ]‘s Articles
[Xue R]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace