مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

243
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

A MODEL FOR SPECIFICATION OF CRYPTOGRAPHIC PROTOCOLS AND ITS OPERATIONAL INTERPRETATION WITH ALGEBRAIC METHODS

Pages

  11-30

Abstract

 Logic analysis and ATTACK CONSTRUCTION methods are two major approaches in verification of CRYPTOGRAPHIC PROTOCOLS. However, it is almost preferable to use both of them for a complete analysis. In this paper, a generic framework for the integration of the two verification approaches is presented. Using the framework we can propose analysis methods in which security properties and breach scenarios of the properties in a protocol can be verified in a unified manner. The focus on this paper is on a COMPUTATIONAL MODEL of the protocols as the major component of the framework. The operational interpretation of the COMPUTATIONAL MODEL with a term rewriting system (TRS) is presented too. To specify an intended protocol, we can represent it as a set of individual steps, and then using a transformation algorithm, a terminated and confluent TRS is generated automatically. This TRS is used to construct a special representation of the protocol named the protocol execution path, which can be used as the base of various verification schemes. Specification and verification of a sample protocol is presented too.      

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    JALILI, S., & TORK LADANI, B.. (2003). A MODEL FOR SPECIFICATION OF CRYPTOGRAPHIC PROTOCOLS AND ITS OPERATIONAL INTERPRETATION WITH ALGEBRAIC METHODS. MODARES TECHNICAL AND ENGINEERING, -(13), 11-30. SID. https://sid.ir/paper/538095/en

    Vancouver: Copy

    JALILI S., TORK LADANI B.. A MODEL FOR SPECIFICATION OF CRYPTOGRAPHIC PROTOCOLS AND ITS OPERATIONAL INTERPRETATION WITH ALGEBRAIC METHODS. MODARES TECHNICAL AND ENGINEERING[Internet]. 2003;-(13):11-30. Available from: https://sid.ir/paper/538095/en

    IEEE: Copy

    S. JALILI, and B. TORK LADANI, “A MODEL FOR SPECIFICATION OF CRYPTOGRAPHIC PROTOCOLS AND ITS OPERATIONAL INTERPRETATION WITH ALGEBRAIC METHODS,” MODARES TECHNICAL AND ENGINEERING, vol. -, no. 13, pp. 11–30, 2003, [Online]. Available: https://sid.ir/paper/538095/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
    File Not Exists.
    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button