Model checking of trusted cryptographic module

The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given. Meanwhile, the framework was proposed for analyzing the sec...

Full description

Saved in:
Bibliographic Details
Main Authors: CHEN Xiao-feng, FENG Deng-guo
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649158/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items