Requirements for security protocols

Wuu Yang*, Rong Hong Jan

*此作品的通信作者

研究成果: Article同行評審

1 引文 斯高帕斯(Scopus)

摘要

A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.

原文English
頁(從 - 到)1576-1581
頁數6
期刊WSEAS Transactions on Computers
5
發行號7
出版狀態Published - 1 7月 2006

指紋

深入研究「Requirements for security protocols」主題。共同形成了獨特的指紋。

引用此