Security protocols: from linear to classical logic by abstract interpretation
暂无分享,去创建一个
[1] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[2] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[3] Christoph Weidenbach,et al. Towards an Automatic Analysis of Security Protocols in First-Order Logic , 1999, CADE.
[4] Hisao Tamaki,et al. Unfold/Fold Transformation of Logic Programs , 1984, ICLP.
[5] A. Scedrov,et al. Interpreting Strands in Linear Logic , 2000 .
[6] Jean-Yves Girard,et al. Linear logic: its syntax and semantics , 1995 .
[7] Patrick Cousot,et al. Systematic design of program analysis frameworks , 1979, POPL.
[8] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..