Monitoring approach for online security of cryptographic protocol
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with dif...
Saved in:
Main Authors: | Yu-na ZHU, Ji-hong HAN, Lin YUAN, Yu-dan FAN, Han-tuo CHEN, Wen GU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
by: Alireza Abdellahi Khorasgani, et al.
Published: (2023-07-01) -
Research on semantics of trust transitivity in cryptographic primitives
by: WANG Li-cheng1, et al.
Published: (2008-01-01) -
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
by: Purushottam Singh, et al.
Published: (2025-01-01) -
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
by: Nianping WANG, et al.
Published: (2021-08-01) -
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
by: Daniel Cervantes‐Vázquez, et al.
Published: (2021-09-01)