Title: | using spin to model cryptographic protocols |
Author: | Li YJ
; Xue R
|
Conference Name: | International Conference on Information Technology - Coding and Computing
|
Conference Date: | APR 05-07,
|
Issued Date: | 2004
|
Conference Place: | Las Vegas, NV
|
Publisher: | ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS
|
Publish Place: | 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
|
Indexed Type: | istp
|
ISBN: | 0-7695-2108-8
|
Department: | Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China.
|
Sponsorship: | IEEE Comp Soc
|
English Abstract: | We explore the useof Spitz to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruders knowledge, and so on. Based on this, we develop a general method to |
Language: | 英语
|
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/13038
|
Appears in Collections: | 软件所图书馆_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
01286745.pdf(1364KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Li YJ,Xue R. using spin to model cryptographic protocols[C]. 见:International Conference on Information Technology - Coding and Computing. Las Vegas, NV. APR 05-07,.
|
|
|