摘要
A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.
原文 | English |
---|---|
頁(從 - 到) | 1576-1581 |
頁數 | 6 |
期刊 | WSEAS Transactions on Computers |
卷 | 5 |
發行號 | 7 |
出版狀態 | Published - 1 7月 2006 |