A Security Analysis Method for Security Protocol Implementations Based on Message Construction
Security protocols are integral to the protection of cyberspace against malicious attacks. Therefore, it is important to be confident in the security of a security protocol. In previous years, people have worked on security of security protocol abstract specification. However, in recent years, peopl...
| Published in: | Applied Sciences |
|---|---|
| Main Authors: | Jintian Lu, Lili Yao, Xudong He, Chintser Huang, Dejun Wang, Bo Meng |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2018-12-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/8/12/2543 |
Similar Items
Security analysis of security protocol Swift implementations based on computational model
by: Bo MENG, et al.
Published: (2018-09-01)
by: Bo MENG, et al.
Published: (2018-09-01)
Security analysis of security protocol Swift implementations based on computational model
by: Bo MENG, et al.
Published: (2018-09-01)
by: Bo MENG, et al.
Published: (2018-09-01)
Security model design and formal verification of MQTT protocol
by: Chengtai Gao, et al.
Published: (2025-10-01)
by: Chengtai Gao, et al.
Published: (2025-10-01)
Security and Privacy of Contact Tracing Protocols for COVID-19
by: Zhen Ang Soh, et al.
Published: (2022-03-01)
by: Zhen Ang Soh, et al.
Published: (2022-03-01)
Secure Z-MAC Protocol as a Proposed Solution for Improving Security in WSNs
by: Mona Nasser Almansoori, et al.
Published: (2022-02-01)
by: Mona Nasser Almansoori, et al.
Published: (2022-02-01)
A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network
by: Long Yin, et al.
Published: (2022-08-01)
by: Long Yin, et al.
Published: (2022-08-01)
SIM: a secure IP protocol for MANET
by: Rong-sen LI, et al.
Published: (2013-08-01)
by: Rong-sen LI, et al.
Published: (2013-08-01)
SIM: a secure IP protocol for MANET
by: Rong-sen LI, et al.
Published: (2013-08-01)
by: Rong-sen LI, et al.
Published: (2013-08-01)
IoT: Communication protocols and security threats
by: Apostolos Gerodimos, et al.
Published: (2023-01-01)
by: Apostolos Gerodimos, et al.
Published: (2023-01-01)
A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering
by: Xin Luo, et al.
Published: (2019-02-01)
by: Xin Luo, et al.
Published: (2019-02-01)
A Shared-Key Security Protocol and Its Flaw
by: Waseem Akhtar Mufti
Published: (2005-06-01)
by: Waseem Akhtar Mufti
Published: (2005-06-01)
„PROTOCOL AND PERSONAL SECURITY - CORRELATION, COORDINATION AND COOPERATION FOR MAXIMUM EFFECT“
by: Sande Smiljanov
Published: (2023-06-01)
by: Sande Smiljanov
Published: (2023-06-01)
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function
by: Muna Mohammed Al-Nayar
Published: (2011-12-01)
by: Muna Mohammed Al-Nayar
Published: (2011-12-01)
Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust
by: Ashfaq Ahmed, et al.
Published: (2023-01-01)
by: Ashfaq Ahmed, et al.
Published: (2023-01-01)
A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
by: Ali Peivandizadeh, et al.
Published: (2024-09-01)
by: Ali Peivandizadeh, et al.
Published: (2024-09-01)
Messaging Protocols for IoT Systems—A Pragmatic Comparison
by: Jacek Wytrębowicz, et al.
Published: (2021-10-01)
by: Jacek Wytrębowicz, et al.
Published: (2021-10-01)
A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks
by: Krzysztof Daniluk, et al.
Published: (2012-09-01)
by: Krzysztof Daniluk, et al.
Published: (2012-09-01)
Survey on industrial control protocol security research
by: HUANG Tao, et al.
Published: (2024-06-01)
by: HUANG Tao, et al.
Published: (2024-06-01)
Survey on industrial control protocol security research
by: HUANG Tao, et al.
Published: (2024-06-01)
by: HUANG Tao, et al.
Published: (2024-06-01)
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
by: Hwanseok Yang
Published: (2025-01-01)
by: Hwanseok Yang
Published: (2025-01-01)
Comparative analysis of transfer protocols asynchronous messages on systems queuing
by: Grzegorz Derlatka, et al.
Published: (2023-03-01)
by: Grzegorz Derlatka, et al.
Published: (2023-03-01)
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
by: Sabina Szymoniak, et al.
Published: (2021-04-01)
by: Sabina Szymoniak, et al.
Published: (2021-04-01)
Anonymous Asynchronous Ratchet Tree Protocol for Group Messaging
by: Kaiming Chen, et al.
Published: (2021-02-01)
by: Kaiming Chen, et al.
Published: (2021-02-01)
Security Model for TCP/IP Protocol Suite
by: Anand Kumar, et al.
Published: (2011-05-01)
by: Anand Kumar, et al.
Published: (2011-05-01)
Simulation and Evaluation of CTP and Secure-CTP Protocols
by: P. Pecho, et al.
Published: (2010-04-01)
by: P. Pecho, et al.
Published: (2010-04-01)
Enhancing Security and Privacy in Modern Text-Based Instant Messaging Communications
by: VUKOVIC GRBIC, D., et al.
Published: (2024-05-01)
by: VUKOVIC GRBIC, D., et al.
Published: (2024-05-01)
Cryptographic mechanisms for secure interaction of control and measuring devices
by: Alexey Yu. Nesterenko, et al.
Published: (2020-12-01)
by: Alexey Yu. Nesterenko, et al.
Published: (2020-12-01)
SSMCI:verification mechanism for security protocols centered on the attacker
by: Wen GU, et al.
Published: (2017-10-01)
by: Wen GU, et al.
Published: (2017-10-01)
SSMCI:verification mechanism for security protocols centered on the attacker
by: Wen GU, et al.
Published: (2017-10-01)
by: Wen GU, et al.
Published: (2017-10-01)
Is it possible to decide whether a cryptographic protocol is secure or not?
by: Hubert Comon, et al.
Published: (2002-12-01)
by: Hubert Comon, et al.
Published: (2002-12-01)
Property-Based Testing for Cybersecurity: Towards Automated Validation of Security Protocols
by: Manuel J. C. S. Reis
Published: (2025-05-01)
by: Manuel J. C. S. Reis
Published: (2025-05-01)
An Edge-Fog Secure Self-Authenticable Data Transfer Protocol
by: Algimantas Venčkauskas, et al.
Published: (2019-08-01)
by: Algimantas Venčkauskas, et al.
Published: (2019-08-01)
Security protocol of wireless sensor networks localization: analysis and performance
by: Omar Faruq, et al.
Published: (2025-04-01)
by: Omar Faruq, et al.
Published: (2025-04-01)
Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications
by: N. Sharmila Kumari, et al.
Published: (2024-01-01)
by: N. Sharmila Kumari, et al.
Published: (2024-01-01)
5G-based smart airport network security scheme design and security analysis
by: Xinxin XING, et al.
Published: (2023-10-01)
by: Xinxin XING, et al.
Published: (2023-10-01)
5G-based smart airport network security scheme design and security analysis
by: Xinxin XING, Qingya ZUO, Jianwei LIU
Published: (2023-10-01)
by: Xinxin XING, Qingya ZUO, Jianwei LIU
Published: (2023-10-01)
A Non-intrusive Method for Enhancing the Security of Modbus TCP Protocol Based on Cloud-Edge Collaboration in Distributed Resources
by: Zheqiu HETU, et al.
Published: (2024-09-01)
by: Zheqiu HETU, et al.
Published: (2024-09-01)
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
by: Khwaja Mansoor, et al.
Published: (2019-11-01)
by: Khwaja Mansoor, et al.
Published: (2019-11-01)
Improvement on the XTP public key cryptosystem and communication protocol of provable security
by: WANG Ze-hui
Published: (2007-01-01)
by: WANG Ze-hui
Published: (2007-01-01)
Improvement on the XTP public key cryptosystem and communication protocol of provable security
by: WANG Ze-hui
Published: (2007-01-01)
by: WANG Ze-hui
Published: (2007-01-01)
Similar Items
-
Security analysis of security protocol Swift implementations based on computational model
by: Bo MENG, et al.
Published: (2018-09-01) -
Security analysis of security protocol Swift implementations based on computational model
by: Bo MENG, et al.
Published: (2018-09-01) -
Security model design and formal verification of MQTT protocol
by: Chengtai Gao, et al.
Published: (2025-10-01) -
Security and Privacy of Contact Tracing Protocols for COVID-19
by: Zhen Ang Soh, et al.
Published: (2022-03-01) -
Secure Z-MAC Protocol as a Proposed Solution for Improving Security in WSNs
by: Mona Nasser Almansoori, et al.
Published: (2022-02-01)
