The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The mobile e-commerce protocols often have more complex structures than authentication protocols. Strand space model (SSM) is an intutive, highly efficient formal analysis method. In this paper, the strand space model is described and expanded, and the confidentiality, authentication and fairness of KSL protocol are analyzed by strand space formal methods. The analysis shows KSL is unfair and an improvement...
As IT systems proliferate to support business processes, users and system administrators are faced with an increasingly complicated interface to accomplish their job functions, some uniform identity authentication systems are developed to integrate different application systems in recent years. However, most of them only can integrate C/S systems. Thus, a new uniform identity authentication system...
Workflow management promises a new solution to an ancient problem: monitoring, controlling and supporting business processes. What is new about workflow management is the explicit representation of the business process logic. Traditional workflow management models have obvious shortcomings in describing complex workflows. Such complexity is due not only to the complicated dependencies among tasks,...
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, combining some analysis methods currently for analysis of security protocols based on Petri Nets methods together,...
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Rubin logic has been extended to analyze electronic commerce...
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. BAN-like logic is one of the main techniques for analysis of authentication protocols, but protocols idealization is...
With the fast development of network technology, computer technology, digitized information technology and image processing technology, some online score systems based on the network are developed in recent years. However, they only can be used in the local area network. Thus, a new online score system is designed and implemented to able to be used in the Internet. The structures of this system are...
Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. However, most current protocol analysis methods can only be used to analyze part of properties required by electronic commerce protocols. Rubin logic is a good method for analyzing security protocols. Considered the properties of electronic commerce protocols,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.