CAPSL integrated protocol environment
暂无分享,去创建一个
[1] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[2] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[3] Jonathan Millen. A Necessarily Parallel Attack , 1999 .
[4] Stephen H. Brackin. An interface specification language for automatically analyzing cryptographic protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[5] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[7] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[8] José Meseguer,et al. Conditioned Rewriting Logic as a United Model of Concurrency , 1992, Theor. Comput. Sci..
[9] José Meseguer,et al. Reflection and strategies in rewriting logic , 1996, WRLA.
[10] Joshua D. Guttman,et al. Honest ideals on strand spaces , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[11] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[12] G. Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using CSP and FDR , 1996 .
[13] S. Brackin,et al. CAPSL interface for the NRL Protocol Analyzer , 1999, Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122).
[14] José Meseguer,et al. Rewriting Logic as a Semantic Framework for Concurrency: a Progress Report , 1996, CONCUR.
[15] J. MeseguerComputer. Protocol Speci cation and Analysis in Maude , 1998 .
[16] M. Clavel,et al. Principles of Maude , 1996, WRLA.
[17] Carolyn L. Talcott,et al. Formal specification and analysis of active networks and communication protocols: the Maude experience , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[18] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[19] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[20] Jonathan K. Millen,et al. CAPSL: Common Authentication Protocol Specification Language , 1996, NSPW '96.
[21] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[22] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[23] G Denker,et al. Capsl Intermediate Language , 1999 .
[24] Natarajan Shankar,et al. PVS: A Prototype Verification System , 1992, CADE.