Jia She’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Fig. 1. The process of key generation and reauthorization 
Algebraic Formalization and Verification of PKMv3 Protocol using Maude
  • Conference Paper
  • Full-text available

July 2017

·

107 Reads

·

1 Citation

Jia She

·

·

Download

Citations (1)


... However, the result demonstrates that Man in Middle attack may exist in the PKMv3 protocol. In [25], the PKMv3 has been formalized in an algebraic language called Maude. For verification, the authors considered the time features and the behavior of the intruders. ...

Reference:

A modified PKM environment for the security enhancement of IEEE 802.16e
Algebraic Formalization and Verification of PKMv3 Protocol using Maude