Closing the Idealization Gap with Theory Generation ( Extended Abstract )
暂无分享,去创建一个
[1] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[3] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[4] John Ulrich,et al. Automated Analysis of Cryptographic Protocols Using Mur ' , 1997 .
[5] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[7] Jeannette M. Wing,et al. Fast, automatic checking of security protocols , 1996 .
[8] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[9] Rajashekar Kailar. Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..
[10] Colin Boyd,et al. Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.
[11] Wenbo Mao,et al. An augmentation of BAN-like logics , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[12] Somesh Jha,et al. Model Checking for Security Protocols , 1997 .
[13] Volker Kessler,et al. AUTLOG-an advanced logic of authentication , 1994, Proceedings The Computer Security Foundations Workshop VII.
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.