完整後設資料紀錄
DC 欄位語言
dc.contributor.authorYang, Wen_US
dc.date.accessioned2014-12-08T15:25:34Z-
dc.date.available2014-12-08T15:25:34Z-
dc.date.issued2005en_US
dc.identifier.isbn0-7695-2316-1en_US
dc.identifier.urihttp://hdl.handle.net/11536/17969-
dc.description.abstractSecurity protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.en_US
dc.language.isoen_USen_US
dc.titleUncovering attacks on security protocolsen_US
dc.typeProceedings Paperen_US
dc.identifier.journalThird International Conference on Information Technology and Applications, Vol 2, Proceedingsen_US
dc.citation.spage572en_US
dc.citation.epage575en_US
dc.contributor.department交大名義發表zh_TW
dc.contributor.departmentNational Chiao Tung Universityen_US
dc.identifier.wosnumberWOS:000230664200109-
顯示於類別:會議論文