完整後設資料紀錄
DC 欄位語言
dc.contributor.author蔡柏良en_US
dc.contributor.author楊武en_US
dc.date.accessioned2014-12-12T02:45:50Z-
dc.date.available2014-12-12T02:45:50Z-
dc.date.issued2004en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#GT009223514en_US
dc.identifier.urihttp://hdl.handle.net/11536/76563-
dc.description.abstract由於在目前的電腦網路架構下,網路使用者並沒有一個好的機制可以認證對方的身分,因此一個安全認證規約就不可或缺,所以它的安全性和正確性就一直受到注意,在過去的文獻中,許許多多分析的方法都被提出,而其中以邏輯系統分析的方式比較完整且比較正式,但是這些邏輯系統不是實作上較困難就是需要非常有經驗的人才可以了解,因此我們在本論文中,提出一個可以有效找出一個安全認證規約弱點的系統,且實作上是非常容易的,我們將會介紹如何實作所提出的安全規約分析系統在Prolog的環境下,並且提出分析的方法,而這個安全規約分析系統將對發展一個安全規約的設計者有很大的幫助。zh_TW
dc.description.abstractA security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights since past years. Many logic systems have been proposed in plenty of papers. However, they are either hard to implement or need lots of experience. We propose an efficient system for inspecting the correctness of security protocols and its implementation, which we adopt prolog language as our derivation engine. Then we suggest detection methods to reveal the potential vulnerabilities of a security protocol. We believe that the proposed system will be helpful in testing a security protocol.en_US
dc.language.isozh_TWen_US
dc.subject安全規約zh_TW
dc.subject認證zh_TW
dc.subject弱點zh_TW
dc.subject相似訊息攻擊zh_TW
dc.subjectsecurity protocolen_US
dc.subjectauthenticationen_US
dc.subjectvulnerabilityen_US
dc.subjectsimilarity attacken_US
dc.title安全規約分析系統zh_TW
dc.titleA System for Deriving Vulnerabilities of Security Protocolsen_US
dc.typeThesisen_US
dc.contributor.department資訊科學與工程研究所zh_TW
顯示於類別:畢業論文


文件中的檔案:

  1. 351402.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。