Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows - IEEE journal on selected areas in …, 2003 - ieeexplore.ieee.org
The history of the application of formal methods to cryptographic protocol analysis spans
over 20 years and has been showing signs of new maturity and consolidation. Not only have …
over 20 years and has been showing signs of new maturity and consolidation. Not only have …
Multiset rewriting and the complexity of bounded security protocols
We formalize the Dolev–Yao model of security protocols, using a notation based on multiset
rewriting with existentials. The goals are to provide a simple formal notation for describing …
rewriting with existentials. The goals are to provide a simple formal notation for describing …
Dynamic spectrum sharing in a blockchain enabled network with multiple cell-free massive MIMO virtual operators
This paper introduces a novel dynamic spectrum sharing (DSS) scheme designed for cell-
free massive MIMO (CF-mMIMO) networks. The motivation behind this work arises from the …
free massive MIMO (CF-mMIMO) networks. The motivation behind this work arises from the …
Fair exchange
H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …
in this area has led research into studying methods of how to perform safe and secure online …
Security protocol design via authentication tests
JD Guttman - Proceedings 15th IEEE Computer Security …, 2002 - ieeexplore.ieee.org
We describe a protocol design process, and illustrate its use by creating ATSPECT, an
authentication test-based secure protocol for electronic commerce transactions. The design …
authentication test-based secure protocol for electronic commerce transactions. The design …
Formal analysis of multiparty contract signing
We analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of
Baum and Waidner (BW). We use a finite-state tool, M ocha, which allows specification of …
Baum and Waidner (BW). We use a finite-state tool, M ocha, which allows specification of …
Game analysis of abuse-free contract signing
In this paper we report on the verification of two contract signing protocols. Our verification
method is based on the idea of modeling those protocols as games, and reasoning about …
method is based on the idea of modeling those protocols as games, and reasoning about …
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to
automatically analyse properties of probabilistic contract signing protocols. We use the …
automatically analyse properties of probabilistic contract signing protocols. We use the …
Abuse-freeness in contract signing: a blockchain-based proposal
Electronic contract signing requires the design of protocols that guarantee that the exchange
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …
Compositional analysis of contract-signing protocols
We develop a general method for proving properties of contract-signing protocols using a
specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …
specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …