최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.8, 2020년, pp.23674 - 23688
Zhang, Jingjing (Army Engineering University of PLA, College of Command and Control Engineering, Nanjing, China) , Yang, Lin (Institute of System Engineering, Chinese Academy of Military Science, National Key Laboratory of Science and Technology on Information System Security, Beijing, China) , Cao, Weipeng (Shenzhen University, College of Computer Science and Software Engineering, Shenzhen, China) , Wang, Qiang (Institute of System Engineering, Chinese Academy of Military Science, National Key Laboratory of Science and Technology on Information System Security, Beijing, China)
As a critical component of the security architecture of 5G network, the authentication protocol plays a role of the first safeguard in ensuring the communication security, such as the confidentiality of user data. EAP-TLS is one of such protocols being defined in the 5G standards to provide key serv...
Cao, Weipeng, Wang, Xizhao, Ming, Zhong, Gao, Jinzhu. A review on neural networks with random weights. Neurocomputing, vol.275, 278-287.
3G Security Security Architecture 2013
Proc 27th USENIX Secur Symp USENIX Secur Protocol state fuzzing of TLS implementations de ruiter 2015 15 193
Blanchet, B.. A Computationally Sound Mechanized Prover for Security Protocols. IEEE transactions on dependable and secure computing, vol.5, no.4, 193-207.
Formal Models and Techniques for Analyzing Security Protocols Constraint solving techniques and enriching the model with equational theories comon-lundh 2011 5 35
Computer Aided Verification The Scyther tool: Verification, falsification, and analysis of security protocols cremers 2008 10.1007/978-3-540-70545-1_38 414
Khan, Rabia, Kumar, Pardeep, Jayakody, Dushantha Nalin K., Liyanage, Madhusanka. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Communications surveys and tutorials, vol.22, no.1, 196-248.
Piqueras Jover, Roger, Marojevic, Vuk. Security and Protocol Exploit Analysis of the 5G Specifications. IEEE access : practical research, open solutions, vol.7, 24956-24963.
Armando, A., Compagna, L.. SATMC: A SAT-Based Model Checker for Security Protocols. Lecture notes in computer science, vol.3229, 730-733.
Cao, Weipeng, Gao, Jinzhu, Ming, Zhong, Cai, Shubin, Shan, Zhiguang. Fuzziness-based online sequential extreme learning machine for classification problems. Soft computing : a fusion of foundations, methodologies and applications, vol.22, no.11, 3487-3494.
Basin, David, Mödersheim, Sebastian, Viganò, Luca. OFMC: A symbolic model checker for security protocols. International Journal of Information Security : IJIS, vol.4, no.3, 181-208.
Cortier, Véronique, Delaune, Stéphanie, Lafourcade, Pascal. A survey of algebraic properties used in cryptographic protocols. Journal of computer security, vol.14, no.1, 1-43.
Blanchet, Bruno. Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif. Foundations and trends in privacy and security, vol.1, no.1, 1-135.
Proc 14th IEEE Computer Security Foundations Workshop An efficient cryptographic protocol verifier based on prolog rules blanchet 2005 82
Abadi, Martín, Blanchet, Bruno, Fournet, Cédric. The Applied Pi Calculus : Mobile Values, New Names, and Secure Communication. Journal of the Association for Computing Machinery, vol.65, no.1, 1-41.
Dolev, D., Yao, A.. On the security of public key protocols. IEEE transactions on information theory, vol.29, no.2, 198-208.
Formal Models and Techniques for Analyzing Security Protocols Using Horn clauses for analyzing security protocols blanchet 2011 5 86
Security issues in the 5G standard and how formal methods come to the rescue hirschi 2019 2019
Borgaonkar, Ravishankar, Hirschi, Lucca, Park, Shinjo, Shaik, Altaf. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols. Proceedings on privacy enhancing technologies, vol.2019, no.3, 108-127.
Basin, David, Cremers, Cas, Miyazaki, Kunihiko, Radomirovic, Sasa, Watanabe, Dai. Improving the Security of Cryptographic Protocol Standards. IEEE security & privacy, vol.13, no.3, 24-31.
Lowe, Gavin. An attack on the Needham-Schroeder public-key authentication protocol. Information processing letters, vol.56, no.3, 131-133.
Proc IEEE Computer Security Foundations Workshop Athena: A new efficient automatic checker for security protocol analysis song 2003 192
Proc IEEE Symp Secur Privacy Automated analysis of cryptographic protocols using Mur $\phi$ mitchell 2002 141
The Transport Layer Security (TLS) Protocol Version 1 2 2008
Clarke, E. M., Jha, S., Marrero, W.. Verifying security protocols with Brutus. ACM transactions on software engineering and methodology, vol.9, no.4, 443-487.
Security architecture and procedures for 5G System 2019
Basin, David, Cremers, Cas, Dreier, Jannik, Sasse, Ralf. Symbolically analyzing security protocols using tamarin. Siglog news, vol.4, no.4, 19-30.
Computer Aided Verification The tamarin prover for the symbolic analysis of security protocols meier 2013 696
Braeken, An, Liyanage, Madhusanka, Kumar, Pardeep, Murphy, John. Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks. IEEE access : practical research, open solutions, vol.7, 64040-64052.
Bana, G., Comon-Lundh, H.. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. Lecture notes in computer science, vol.7215, 189-208.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.