Protocol Implementation Generator
暂无分享,去创建一个
[1] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..
[2] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[3] Andrew Hutchison,et al. Automated Attack Analysis and Code Generation in a Multi-Dimensional Security Protocol Engineering Framework , 2003 .
[4] Dawn Xiaodong Song,et al. AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.
[5] 권태경,et al. SSL Protocol 기반의 서버인증 , 2003 .
[6] Hjalte Wedel Vildhøj,et al. Secure Protocol Implementation with LySa , 2009 .
[7] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[8] Andrew D. Gordon,et al. Verified Interoperable Implementations of Security Protocols , 2006, CSFW.
[9] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[10] Jin-Young Choi,et al. Automatic generation of the C# code for security protocols verified with Casper/FDR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[11] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[12] Anna Philippou,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.
[13] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[14] Elton Saul,et al. SPEAR II The Security Protocol Engineering and Analysis Resource , 1999 .
[15] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[16] Andrew D. Gordon,et al. Refinement Types for Secure Implementations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[17] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[18] T. Tanaka,et al. A Security Protocol Compiler Generating C Source Codes , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[19] Jonei Cerqueira Barbosa,et al. What is Mathematical Modelling , 2003 .
[20] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[21] Eva Rose,et al. Lightweight Bytecode Verification , 2004, Journal of Automated Reasoning.
[22] Andreas Podelski,et al. Tools and algorithms for the construction and analysis of systems , 2006, International Journal on Software Tools for Technology Transfer.
[23] Mikael Buchholtz,et al. User ’ s Guide for the LySatool version 2 . 01 , 2005 .
[24] Alfredo Pironti,et al. Provably correct Java implementations of Spi Calculus security protocols specifications , 2010, Comput. Secur..
[25] Thorsten Tarrach. SPI2F - A Prototype Code Generator for Security Protocols , 2009 .
[26] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[27] Andrew William Roscoe,et al. Model-checking CSP , 1994 .
[28] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[29] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[30] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[31] Luca Durante,et al. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[32] Adriano Valenzano,et al. Automatic testing equivalence verification of spi calculus specifications , 2003, TSEM.
[33] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[34] John Larmouth. ASN.1 Complete , 1999 .
[35] Martín Abadi,et al. Analyzing security protocols with secrecy types and logic programs , 2002, POPL '02.
[36] Dawn Xiaodong Song,et al. Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..
[37] ROBIN MILNER,et al. Edinburgh Research Explorer A Calculus of Mobile Processes, I , 2003 .
[38] Terence Parr. The Definitive ANTLR Reference: Building Domain-Specific Languages , 2007 .
[39] Flemming Nielson,et al. The Succinct Solver Suite , 2004, TACAS.