Formal Verification of 802.11i using Strand Space Formalism
暂无分享,去创建一个
[1] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[2] Steve A. Schneider,et al. Towards automatic verification of authentication protocols on an unbounded network , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[3] Ernie Cohen. TAPS: a first-order verifier for cryptographic protocols , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[4] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[5] Catherine A. Meadows,et al. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.
[6] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[7] Dawn Xiaodong Song,et al. A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.
[8] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[9] Doron A. Peled. Combining Partial Order Reductions with On-the-fly Model-Checking , 1994, CAV.
[10] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[11] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[12] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[13] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[14] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[16] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[17] Richard M. Karp,et al. On the Security of Ping-Pong Protocols , 1982, Information and Control.
[18] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[19] Jeannette M. Wing,et al. Fast, automatic checking of security protocols , 1996 .
[20] Doron A. Peled,et al. All from One, One for All: on Model Checking Using Representatives , 1993, CAV.
[21] Richard M. Karp,et al. On the Security of Ping-Pong Protocols , 1982, Inf. Control..
[22] Catherine A. Meadows,et al. A model of computation for the NRL Protocol Analyzer , 1994, Proceedings The Computer Security Foundations Workshop VII.
[23] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[24] Dawn Xiaodong Song,et al. Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..