全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Research on how to reconcile two views of security protocols''''analysis
调和安全协议两种分析方法的理论研究

Keywords: security protocol,symbol approach,computational approach,cryptographic soundness
安全协议
,符号方法,计算方法,密码学可靠性

Full-Text   Cite this paper   Add to My Lib

Abstract:

The formal methods of security protocol was categorized as two classes: the symbol approach, and the computational approach. The first relies on a simple but effective formal approach; the latter, on a detailed computational model that considers issues of complexity and probability. Each approach had flaws and virtues. There was an uncomfortable and interesting gap between these two approaches to cryptography. How to bridge the gap by drawing virtues from both approach and discarding their flaw was the new challenge. This paper described the most popular methods, analyzed the current status, as well as pointed out the tendency of them.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133