Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols
暂无分享,去创建一个
[1] Vipin Swarup,et al. Metric Strand Spaces for Locale Authentication Protocols , 2010, IFIPTM.
[2] Glynn Winskel,et al. Event Structures , 1986, Advances in Petri Nets.
[3] Luca Viganò,et al. Metareasoning about Security Protocols using Distributed Temporal Logic , 2005, Electron. Notes Theor. Comput. Sci..
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[6] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[7] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[8] Grzegorz Rozenberg,et al. Advances in Petri Nets 1985 , 1985, Lecture Notes in Computer Science.
[9] Luca Viganò,et al. Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis , 2005, Log. J. IGPL.
[10] Mehmet A. Orgun,et al. Modal tableaux for verifying stream authentication protocols , 2007, Autonomous Agents and Multi-Agent Systems.
[11] Reiner Dojen,et al. Formal verification: an imperative step in the design of security protocols , 2003, Comput. Networks.
[12] Masakatsu Nishigaki,et al. Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings , 2010, IFIPTM.
[13] Paul F. Syverson,et al. The Logic of Authentication Protocols , 2000, FOSAD.
[14] Joshua D. Guttman,et al. Authentication tests and the structure of bundles , 2002, Theor. Comput. Sci..
[15] Colin J. Fidge,et al. A survey of verification techniques for security protocols , 2001 .
[16] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).