Cart (Loading....) | Create Account
Close category search window
 

Research of formal design of authentication protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yajie Zhou ; Comput. Sch., Wuhan Univ., Wuhan, China ; Huanmei Guan

Authentication is one of the most important properties in network security, it is usually ensured by designing authentication protocols which use cryptographic techniques. Unfortunately, practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic generation of authentication security protocols based on the evolutionary algorithm and SVO logic and illustrates the approach can automatic generate large-scale authentication protocols, such as three-party key agreement etc.

Published in:

Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on  (Volume:3 )

Date of Conference:

20-22 Nov. 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.