Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
暂无分享,去创建一个
[1] Dawn Xiaodong Song. Athena: a new efficient automatic checker for security protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[2] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[3] Andreas Podelski,et al. Verification of cryptographic protocols: tagging enforces termination , 2003, Theor. Comput. Sci..
[4] Joshua D. Guttman,et al. Authentication tests and the structure of bundles , 2002, Theor. Comput. Sci..
[5] Alan Bundy,et al. Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.
[6] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[7] Joshua D. Guttman,et al. Security Goals: Packet Trajectories and Strand Spaces , 2000, FOSAD.
[8] Ramaswamy Ramanujam,et al. A decidable subclass of unbounded security protocols , 2007 .
[9] Joshua D. Guttman,et al. The faithfulness of abstract protocol analysis: message authentication , 2001, CCS '01.
[10] Joshua D. Guttman,et al. Searching for Shapes in Cryptographic Protocols , 2007, TACAS.
[11] Joshua D. Guttman,et al. The faithfulness of abstract protocol analysis , 2001, CCS 2001.