Cart (Loading....) | Create Account
Close category search window
 

Notice of Violation of IEEE Publication Principles
Network Protocols Analyzing by an Environmental Bisimulation Method

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Min Gan ; Zhejiang Water Conservancy & Hydropower Coll., Hangzhou ; Guoying Yue ; Hongfa Wang

Notice of Violation of IEEE Publication Principles

"Network Protocols Analyzing by an Environmental Bisimulation Method"
by Min Gan, Guoying Yue, Hongfa Wang
in the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, July 2007, pp 363-367

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

"Analyzing Security Protocols by a Bisimulation Method Based on Environmental Knowledge"
by Y.H. Lu, Y.G. Gu, X.R. Chen and Y. Fu
in the Proceeding of 2005 International Conference on Communications, Circuits and Systems, May 2005, pp. 79-83

Environmental bisimulation method is an important relation in the Spi calculus, which is usually used to reason about interactive systems. In this paper we adopted it in analyzing network protocols and intended to try it on checking the soundness of the Kerberos protocol. Rigorous proofs on its two security properties reveal that the authenticity property holds while its secrecy property is threatened by a possible attack.

Published in:

Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on  (Volume:2 )

Date of Conference:

July 30 2007-Aug. 1 2007

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.