The Theory of Witness-Functions
暂无分享,去创建一个
[1] Steve A. Schneider,et al. A decision procedure for the existence of a rank function , 2005, J. Comput. Secur..
[2] Siraj Ahmed Shaikh,et al. Analysing the Woo-Lam Protocol Using CSP and Rank Functions , 2006, J. Res. Pract. Inf. Technol..
[3] Hamido Fujita,et al. Secrecy of cryptographic protocols under equational theory , 2009, Knowl. Based Syst..
[4] Mohamed Mejri,et al. A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols , 2014, ArXiv.
[5] Mohamed Mejri,et al. Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy , 2008, SECRYPT.
[6] Steve A. Schneider,et al. Verifying Security Protocols: An Application of CSP , 2004, 25 Years Communicating Sequential Processes.
[7] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[8] Véronique Cortier,et al. Protocol Composition for Arbitrary Primitives , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[9] Nadia Tawbi,et al. Formal automatic verification of authentication cryptographic protocols , 1997, First IEEE International Conference on Formal Engineering Methods.
[10] Mohamed Mejri,et al. Secrecy by Witness Functions , 2014, FMS @ Petri Nets.
[11] Nadia Tawbi,et al. From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[12] Véronique Cortier,et al. Safely composing security protocols , 2009, Formal Methods Syst. Des..
[13] Mohamed Mejri,et al. Practical and Universal Interpretation Functions for Secrecy , 2007, SECRYPT.
[14] Mohamed Mejri,et al. Secrecy by witness-functions on increasing protocols , 2014, Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[15] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[17] Véronique Cortier. Secure Composition of Protocols , 2011, TOSCA.
[18] Véronique Cortier,et al. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems , 2011, Journal of Automated Reasoning.
[19] Mourad Debbabi,et al. An environment for the specification and analysis of cryptoprotocols , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[20] Mohamed Mejri,et al. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method , 2012, J. Comput. Networks Commun..
[21] Steve A. Schneider. Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..
[22] Véronique Cortier,et al. Decidability and Combination Results for Two Notions of Knowledge in Security Protocols , 2012, Journal of Automated Reasoning.
[23] Mohamed Mejri,et al. NEW FUNCTIONS FOR SECRECY ON REAL PROTOCOLS , 2014 .
[24] Véronique Cortier,et al. Deciding security properties for cryptographic protocols. application to key cycles , 2007, TOCL.