Method of designing security protocol for remote attestation
By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematicall...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74654101/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537535526830080 |
---|---|
author | YU Rong-wei1 WANG Li-na1 KUANG Bo1 |
author_facet | YU Rong-wei1 WANG Li-na1 KUANG Bo1 |
author_sort | YU Rong-wei1 |
collection | DOAJ |
description | By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability. |
format | Article |
id | doaj-art-4fe18c7a2fb942e5b35658098ea56a41 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-4fe18c7a2fb942e5b35658098ea56a412025-01-14T08:32:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01192474654101Method of designing security protocol for remote attestationYU Rong-wei1WANG Li-na1KUANG Bo1By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.http://www.joconline.com.cn/zh/article/74654101/remote attestationverification protocolevolution computingBAN-like logic |
spellingShingle | YU Rong-wei1 WANG Li-na1 KUANG Bo1 Method of designing security protocol for remote attestation Tongxin xuebao remote attestation verification protocol evolution computing BAN-like logic |
title | Method of designing security protocol for remote attestation |
title_full | Method of designing security protocol for remote attestation |
title_fullStr | Method of designing security protocol for remote attestation |
title_full_unstemmed | Method of designing security protocol for remote attestation |
title_short | Method of designing security protocol for remote attestation |
title_sort | method of designing security protocol for remote attestation |
topic | remote attestation verification protocol evolution computing BAN-like logic |
url | http://www.joconline.com.cn/zh/article/74654101/ |
work_keys_str_mv | AT yurongwei1 methodofdesigningsecurityprotocolforremoteattestation AT wanglina1 methodofdesigningsecurityprotocolforremoteattestation AT kuangbo1 methodofdesigningsecurityprotocolforremoteattestation |