Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:callingme
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method with Casper/FDR2 to model and analyze a new electronic protocol.Attacks are found in the protocol and their mechanisms are discussed.A variety of solutions are given to different security flaws.The improved protocol is proven to be robust and secure.
其他文献
射线管分裂是SBR方法中的一个关键问题,传统的射线管分裂方法存在与目标模型不匹配,计算精度差等缺点,而近年来出现的自适应射线管分裂技术,利用目标模型的三角面片对射线管进行动态剖分,可以有效解决上述问题。本文研究了该技术中的几个关键步骤,通过将Weiler-Atherton算法的内、外裁剪方法相嵌套,给出了射线管孔径面与物体三角片的裁剪算法,并设计了简单有效的凹多边形的凸划分方法,将生成的射线管孔径
利用电磁仿真软件CST对静电放电器现有构型进行仿真计算,探讨静电放电器构型各参数对静电放电噪声的影响,对静电放电器进行构型改进,新型放电器在相同激励下降低了静电放电所产生的噪声强度,降低静电放电器雷达散射截面,提高静电放电器的隐身特性。
针对加性水印中嵌入强度因子的自适应问题进行了研究,提出了一个基于信噪比的自适应音频水印算法.该算法在保证听觉质量的同时,利用信噪比自适应地调节嵌入强度因子,并将水印信号嵌入到音频数据经沃尔什-哈达玛变换后的低频系数中,水印检测时不需要原始音频信号参与.仿真实验结果表明该算法对诸如加噪、滤波、重量化、重采样和MP3压缩等常规信号处理具有较强的鲁棒性,可用于音频数据的版权保护。
To protect against algebraic attacks,a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers.In this paper,a new method based on a univariate polynomial re
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode,wherein insider attacks are the most challenging issue.To addres
Although there exist a few good schemes to protect the kernel hooks of operating systems,attackers are still able to circumvent existing defense mechanisms with spurious context information.To address
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized
This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that the linear complexity of a binary Jacobi sequ
This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference