全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Using Running Model for TW Cryptographic Protocol Analysis
运行模式法分析TW密码协议*

Keywords: TW Cryptographic Protocol,Formal Analysis,Running Model
TW密码协议
,形式化分析,运行模式

Full-Text   Cite this paper   Add to My Lib

Abstract:

A methodology is presented for using running model methods to analyze the two-party cryptographic protocols. We illustrate the feasibility of the approach by analyzing TW cryptographic protocol and discover attacks upon the protocol. Thus, the method using running modes has proved to be an effective approach to analyze two-party cryptographic protocols.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133