A game-based verification of non-repudiation and fair exchange protocols
暂无分享,去创建一个
[1] Colin Boyd,et al. Exploring Fair Exchange Protocols Using Specification Animation , 2000, ISW.
[2] Vitaly Shmatikov,et al. Finite-state analysis of two contract signing protocols , 2002, Theor. Comput. Sci..
[3] Jean-François Raskin,et al. A Game-based Verification of Non-repudiation and Fair Exchange Protocols , 2001, J. Comput. Secur..
[4] Olivier Markowitch,et al. A Multi-party Optimistic Non-repudiation Protocol , 2000, ICISC.
[5] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[6] Steve A. Schneider,et al. Formal analysis of a non-repudiation protocol , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[7] N. Asokan,et al. Asynchronous protocols for optimistic fair exchange , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[8] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[9] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[10] Tom Tedrick,et al. Fair Exchange of Secrets , 1984, CRYPTO.
[11] Olivier Markowitch,et al. Probabilistic Non-Repudiation without Trusted Third Party , 1999 .
[12] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[13] Vitaly Shmatikov,et al. Analysis of a Fair Exchange Protocol , 2000, NDSS.
[14] N. Asokan,et al. Optimistic Fair Exchange of Digital Signatures (Extended Abstract) , 1998, EUROCRYPT.
[15] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[16] Thomas A. Henzinger,et al. Alternating-time temporal logic , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[17] Dieter Gollmann,et al. An efficient non-repudiation protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.
[18] Catherine A. Meadows,et al. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.
[19] Vitaly Shmatikov,et al. Analysis of Abuse-Free Contract Signing , 2000, Financial Cryptography.
[20] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[21] Thomas A. Henzinger,et al. Abstract Interpretation of Game Properties , 2000, SAS.