-
3
-
-
80051982639
-
NetBill security and transaction Protocol
-
B. Cox, J. D. Tygar, and M. Sirbu, "NetBill security and transaction Protocol," in Proc. 1st USENIX Workshop in Electronic Commerce, 1995, pp. 77-88.
-
(1995)
Proc. 1st USENIX Workshop in Electronic Commerce
, pp. 77-88
-
-
Cox, B.1
Tygar, J.D.2
Sirbu, M.3
-
4
-
-
0029724319
-
A fair non-repudiation protocol
-
Oakland, CA, pp
-
J. Zhou, and D. Gollmann, "A fair non-repudiation protocol," in Proc. 1996 IEEE Symposium on Security and Privacy , Oakland, CA , pp. 55-61.
-
Proc. 1996 IEEE Symposium on Security and Privacy
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
-
6
-
-
0034434835
-
A fair non repudiation cryptographic protocol and its formal analysis and applications
-
Dec
-
X. X. Li, and J. P. Huai, "A fair non repudiation cryptographic protocol and its formal analysis and applications," Journal of Software, vol. 11, no. 12, pp. 1628-1634, Dec. 2001.
-
(2001)
Journal of Software
, vol.11
, Issue.12
, pp. 1628-1634
-
-
Li, X.X.1
Huai, J.P.2
-
7
-
-
1442303271
-
A fair non-repudiation protocol and its formal analysis
-
Sep
-
J. Liu, and M.T. Zhou, "A fair non-repudiation protocol and its formal analysis," Acta Electronica Sinica, vol. 31, no.9, pp. 1422-1425, Sep. 2003.
-
(2003)
Acta Electronica Sinica
, vol.31
, Issue.9
, pp. 1422-1425
-
-
Liu, J.1
Zhou, M.T.2
-
8
-
-
2342542981
-
Nonmonotonic cryptographic protocols,
-
Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI
-
A.D. Rubin, "Nonmonotonic cryptographic protocols," Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI, 1994.
-
(1994)
-
-
Rubin, A.D.1
-
9
-
-
0031386327
-
Extending NCP for protocols using public keys
-
Mar
-
A. D. Rubin, "Extending NCP for protocols using public keys," Mobile Networks and Applications, vol. 2, no. 3, pp. 227-241, Mar. 1997.
-
(1997)
Mobile Networks and Applications
, vol.2
, Issue.3
, pp. 227-241
-
-
Rubin, A.D.1
-
10
-
-
0035467046
-
A new approach for the analysis of electronic commerce protocols
-
Sep
-
D. C. Zhou, S. H. Qing, and Z. F. Zhou, "A new approach for the analysis of electronic commerce protocols," Journal of Software, vol. 12, no. 9, pp. 1318-1328, Sep. 2001.
-
(2001)
Journal of Software
, vol.12
, Issue.9
, pp. 1318-1328
-
-
Zhou, D.C.1
Qing, S.H.2
Zhou, Z.F.3
-
11
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
16
-
-
0025405980
-
A critique of the Burrows, Abadi, and Needham logic
-
D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," ACM Operating Systems Review, vol. 24, no. 2, pp. 35-38, 1990.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
17
-
-
0036045935
-
BAN-like logic for cryptographic protocols analysis: A survey
-
Y.Q. Zhang, J. P. Wu, and X. Li, "BAN-like logic for cryptographic protocols analysis: a survey," Journal of Tsinghua University (Sci & Tech), vol. 42, no.1, pp. 96-99, 2002.
-
(2002)
Journal of Tsinghua University (Sci & Tech)
, vol.42
, Issue.1
, pp. 96-99
-
-
Zhang, Y.Q.1
Wu, J.P.2
Li, X.3
-
18
-
-
0034434717
-
The model and its defects of BAN family of logic
-
Dec
-
J. Z. Xu, Y. X. Dai, and Y.N. Zuo, "The model and its defects of BAN family of logic," Journal of Software, vol. 11, no. 12, pp. 1660-1665, Dec. 2000.
-
(2000)
Journal of Software
, vol.11
, Issue.12
, pp. 1660-1665
-
-
Xu, J.Z.1
Dai, Y.X.2
Zuo, Y.N.3
-
19
-
-
33745689203
-
Accountability in electronic commerce protocols
-
R. Kailar, "Accountability in electronic commerce protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, pp. 313-328, 1996.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
20
-
-
0000260312
-
Limitations of Kailar Logic
-
Dec
-
D. C. Zhou, S. H. Qing, and Z. F. Zhou, "Limitations of Kailar Logic," Journal of Software, vol. 10, no.12, pp. 1238-1245, Dec.1999.
-
(1999)
Journal of Software
, vol.10
, Issue.12
, pp. 1238-1245
-
-
Zhou, D.C.1
Qing, S.H.2
Zhou, Z.F.3
-
21
-
-
33750085329
-
-
Z. M. Song, and S. H. Qing, Appling NCP logic to the analysis of SSL3.0, Information and Communication Security, Berlin: Springer-Verlag, 2001, 155-166.
-
Z. M. Song, and S. H. Qing, "Appling NCP logic to the analysis of SSL3.0," Information and Communication Security, Berlin: Springer-Verlag, 2001, 155-166.
-
-
-
-
22
-
-
58049105533
-
Analysis of PKM protocol of LMDS by NCP logic
-
Sep
-
S. X. Shao, J. Chen, and M. Wu, "Analysis of PKM protocol of LMDS by NCP logic, " Journal on Communications, vol. 25, no. 9, pp. 146-152, Sep. 2004.
-
(2004)
Journal on Communications
, vol.25
, Issue.9
, pp. 146-152
-
-
Shao, S.X.1
Chen, J.2
Wu, M.3
-
23
-
-
58049120659
-
Analysis of Authentication Protocols Based on Rubin Logic
-
Dalian, to be published
-
Yang Xu, and X. Y. Xie, "Analysis of Authentication Protocols Based on Rubin Logic," in Proc. 4th IEEE Int. Conf. Wireless Communications, Networking, Mobile Computing, Dalian, 2008, to be published.
-
(2008)
Proc. 4th IEEE Int. Conf. Wireless Communications, Networking, Mobile Computing
-
-
Xu, Y.1
Xie, X.Y.2
-
24
-
-
49249090421
-
Security analysis of routing protocol for MANET based on extended Rubin logic
-
Sanya, pp
-
Yang Xu, and X. Y. Xie, "Security analysis of routing protocol for MANET based on extended Rubin logic," in Proc. 2008 IEEE Int. Conf. Networking, Sensing and Control, Sanya, pp.1326-1331.
-
Proc. 2008 IEEE Int. Conf. Networking, Sensing and Control
, pp. 1326-1331
-
-
Xu, Y.1
Xie, X.Y.2
-
25
-
-
58049156008
-
-
IT security techniques - Non-repudiation - Part 1: General , ISO/IEC 13888-1: 2004.
-
IT security techniques - Non-repudiation - Part 1: General , ISO/IEC 13888-1: 2004.
-
-
-
|