完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Meng, Kong Wai | |
dc.contributor.author | Shan, Li Xiao | |
dc.date.accessioned | 2009-08-23T04:40:04Z | |
dc.date.accessioned | 2020-05-25T06:23:54Z | - |
dc.date.available | 2009-08-23T04:40:04Z | |
dc.date.available | 2020-05-25T06:23:54Z | - |
dc.date.issued | 2006-10-20T01:20:16Z | |
dc.date.submitted | 1998-12-17 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/2028 | - |
dc.description.abstract | In this paper Interval Temporal Logic (ITL) [1] is used to specify cryptographic protocols. We choose Kerberos as a case strudy because of its apparent terporal characteristics. Using ITL, the communication protocol of Kerberos is specified formally. Inference rules of timed belief are presented. Therefore the temporal properties of Kerberos can be specified and verified. | |
dc.description.sponsorship | 成功大學,台南市 | |
dc.format.extent | 7p. | |
dc.format.extent | 449440 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 1998 ICS會議 | |
dc.subject.other | Security Protocols & Others | |
dc.title | SPECIFICATION OF CRYPTOGRAPHIC PROTOCOLS USING INTERVAL TEMPOTAL LOGIC | |
分類: | 1998年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics001998000096.pdf | 438.91 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。