Verifying security protocols by knowledge analysis
暂无分享,去创建一个
[1] Catherine A. Meadows,et al. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.
[2] Jin-Young Choi,et al. Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[3] Fabio Massacci,et al. An overview of the verification of SET , 2005, International Journal of Information Security.
[4] Xiaoqi Ma,et al. Knowledge Based Approach for Mechanically Verifying Security Protocols , 2005, IJCAI.
[5] Xiaoqi Ma,et al. Formal verification of the Merchant Registration phase of the SET protocol , 2005, Int. J. Autom. Comput..
[6] Chengqi Zhang,et al. The Verification Logic for Secure Transaction Protocols , 2002 .
[7] Chengqi Zhang,et al. ENDL: A Logical Framework for Verifying Secure Transaction Protocols , 2003, Knowledge and Information Systems.
[8] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[9] Dominique Bolignano. An approach to the formal verification of cryptographic protocols , 1996, CCS '96.
[10] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[11] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[12] Tobias Nipkow,et al. A Proof Assistant for Higher-Order Logic , 2002 .
[13] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[15] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[16] Xiaoqi Ma,et al. Proving secure properties of cryptographic protocols , 2005 .
[17] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[18] Lawrence C. Paulson. Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys , 1997 .
[19] Armin Liebl,et al. Authentication in distributed systems: a bibliography , 1993, OPSR.