Model checking of trusted cryptographic module
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given. Meanwhile, the framework was proposed for analyzing the sec...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649158/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!