An Extended Logic for Analyzing Timed-Release Public-Key Protocols
暂无分享,去创建一个
[1] ProtocolsLi GongSRI InternationalComputer. Fail-Stop Protocols : An Approach to Designing Secure , 1994 .
[2] Volker Kessler,et al. Formal Semantics for Authentication Logics , 1996, ESORICS.
[3] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Pierre Bieber,et al. A logic of communication in hostile environment , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[5] T. Coffey,et al. Logic for verifying public-key cryptographic protocols , 1997 .
[6] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[7] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Rebecca N. Wright,et al. An authentication logic supporting synchronization, revocation, and recency , 1996, CCS '96.
[9] Paul F. Syverson. Adding time to a logic of authentication , 1993, CCS '93.
[10] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[11] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[12] Colin Boyd,et al. Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[13] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .