p.2360
p.2364
p.2369
p.2374
p.2379
p.2384
p.2389
p.2394
p.2398
Research on the Application of Spatial Logic in the Security Protocol Verification of Computer
Abstract:
The security protocol is the core technology of the network communication security system which can maintain the security of the network environment effectively. With the increasing of the amount of network data, how to make security protocol to meet customers needs for network and information security and how to improve the efficiency of the security agreement are the focuses of exploration of the field of computer security. This paper introduces the security agreement composite form based on the theory of computer logic program, strand space model theory and certification test method. It also expands the Kailar logic and concludes the automotive verification algorithm of security protocol AAAP-KM algorithm. At last, this paper verifies the effectiveness and fastness of AAAP-KM algorithm taking the KM security protocol for example which provide a theoretical reference and technical support for the application and research of cyberspace logical security agreement.
Info:
Periodical:
Pages:
2379-2383
Citation:
Online since:
February 2014
Authors:
Price:
Сopyright:
© 2014 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: