%0 Journal Article %T Using Running Model for TW Cryptographic Protocol Analysis
运行模式法分析TW密码协议* %A WANG Chun-ling %A TANG Zhi-jian %A ZHANG Yu-qing %A XUE Ji-wen %A
王春玲 %A 唐志坚 %A 张玉清 %A 薛纪文 %J 计算机应用研究 %D 2005 %I %X A methodology is presented for using running model methods to analyze the two-party cryptographic protocols. We illustrate the feasibility of the approach by analyzing TW cryptographic protocol and discover attacks upon the protocol. Thus, the method using running modes has proved to be an effective approach to analyze two-party cryptographic protocols. %K TW Cryptographic Protocol %K Formal Analysis %K Running Model
TW密码协议 %K 形式化分析 %K 运行模式 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=1F4E602460DD89F7&yid=2DD7160C83D0ACED&vid=BC12EA701C895178&iid=9CF7A0430CBB2DFD&sid=6270DC1B5693DDAF&eid=4DB1E72614E68564&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=0&reference_num=4