Method of designing security protocol for remote attestation

By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematicall...

Full description

Saved in:
Bibliographic Details
Main Authors: YU Rong-wei1, WANG Li-na1, KUANG Bo1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74654101/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537535526830080
author YU Rong-wei1
WANG Li-na1
KUANG Bo1
author_facet YU Rong-wei1
WANG Li-na1
KUANG Bo1
author_sort YU Rong-wei1
collection DOAJ
description By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.
format Article
id doaj-art-4fe18c7a2fb942e5b35658098ea56a41
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4fe18c7a2fb942e5b35658098ea56a412025-01-14T08:32:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01192474654101Method of designing security protocol for remote attestationYU Rong-wei1WANG Li-na1KUANG Bo1By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.http://www.joconline.com.cn/zh/article/74654101/remote attestationverification protocolevolution computingBAN-like logic
spellingShingle YU Rong-wei1
WANG Li-na1
KUANG Bo1
Method of designing security protocol for remote attestation
Tongxin xuebao
remote attestation
verification protocol
evolution computing
BAN-like logic
title Method of designing security protocol for remote attestation
title_full Method of designing security protocol for remote attestation
title_fullStr Method of designing security protocol for remote attestation
title_full_unstemmed Method of designing security protocol for remote attestation
title_short Method of designing security protocol for remote attestation
title_sort method of designing security protocol for remote attestation
topic remote attestation
verification protocol
evolution computing
BAN-like logic
url http://www.joconline.com.cn/zh/article/74654101/
work_keys_str_mv AT yurongwei1 methodofdesigningsecurityprotocolforremoteattestation
AT wanglina1 methodofdesigningsecurityprotocolforremoteattestation
AT kuangbo1 methodofdesigningsecurityprotocolforremoteattestation