Modelling unbounded parallel sessions of security protocols in CSP
暂无分享,去创建一个
[1] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[2] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[3] A. W. Roscoe,et al. Automating Data Independence , 2000, ESORICS.
[4] Ios Press. Embedding agents within the intruder to detect parallel attacks , 2004 .
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[7] A. W. Roscoe,et al. On the Relationship Between Web Services Security and Traditional Protocols , 2005, MFPS.
[8] Dawn Xiaodong Song,et al. Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..
[9] Philippa J. Hopcroft. Data independence in the model checking of security protocols , 2001 .
[10] A. W. Roscoe,et al. Proving security protocols with model checkers by data independence techniques , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[11] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[12] Scott D. Stoller. Justifying Finite Resources for Adversaries in Automated Analysis of Authentication Protocols , 2007 .
[13] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[14] Michael Goldsmith. The perfect spy for model−checking crypto−protocols , 1997 .
[15] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[16] Gavin Lowe,et al. Analysing a stream authentication protocol using model checking , 2002, International Journal of Information Security.
[17] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[18] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[19] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[20] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .