您当前的位置:
首页 >
文章列表页 >
Formal modeling and security analysis method of security protocol based on CPN
Correspondences | 更新时间:2024-06-05
    • Formal modeling and security analysis method of security protocol based on CPN

    • Journal on Communications   Vol. 42, Issue 9, Pages: 240-253(2021)
    • DOI:10.11959/j.issn.1000-436x.2021175    

      CLC: TP393.06
    • Online First:2021-09

      Published:25 September 2021

    移动端阅览

  • Xiang GONG, Tao FENG, Jinze DU. Formal modeling and security analysis method of security protocol based on CPN[J]. Journal on Communications, 2021, 42(9): 240-253. DOI: 10.11959/j.issn.1000-436x.2021175.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1310

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Security analysis of security protocol Swift implementations based on computational model
Analysis and improvement of the BACnet/IP based on identity authentication
Survey on privacy protection indoor positioning
Deception defense method against intelligent penetration attack

Related Author

SU Chunhua
FENG Tao
ZHENG Lu
Bo MENG
Xudong HE
Jinli ZHANG
Lili YAO
Jintian LU

Related Institution

Division of Computer Science, University of Aizu
College of Computer Science,South Central University For Nationalities
School of Mechanical and Electrical Engineering, Lanzhou University of Technology
School of Computer and Communications, Lanzhou University of Technology
State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan University
0