2001
DOI: 10.1016/s0164-1212(01)00030-9
|View full text |Cite
|
Sign up to set email alerts
|

Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…All of them [6], [8]- [12] with one exception [7] aim at analyzing only one attack trace. The exception [7] offers the analysis of multiple attack traces, but it is inefficient.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…All of them [6], [8]- [12] with one exception [7] aim at analyzing only one attack trace. The exception [7] offers the analysis of multiple attack traces, but it is inefficient.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
“…al. 's works [7], [8] developed place/transition nets which are low-level nets to analyze security protocols. Their method [7] was applied to analyze multiple attack traces for the message replay attack.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [12,[23][24][25][26][27][28], many Petri nets-based methods have been developed and applied to analyze cryptographic protocols. Most of them offer the analysis of one attack trace only.…”
Section: Introductionmentioning
confidence: 99%