Model Checking IBM's Common Cryptographic Architecture API
暂无分享,去创建一个
[1] Jonathan Herzog Mitre. Applying Protocol Analysis to Security Device Interfaces , 2006 .
[2] Mike Bond,et al. Extending Security Protocol Analysis: New Challenges , 2005, Electron. Notes Theor. Comput. Sci..
[3] Mike Bond,et al. Robbing the Bank with a Theorem Prover - (Abstract) , 2007, Security Protocols Workshop.
[4] Mike Bond. Understanding security APIs , 2004 .
[5] Mike Bond. A Chosen Key Difference Attack on Control Vectors , 2000 .
[6] Véronique Cortier,et al. On the Decidability of a Class of XOR-based Key-management APIs , 2006 .
[7] Graham Steel,et al. Deduction with XOR Constraints in Security API Modelling , 2005, CADE.
[8] Mike Bond. Attacks on Cryptoprocessor Transaction Sets , 2001, CHES.
[9] Paul Youn,et al. The analysis of cryptographic APIs using the theorem prover Otter , 2004 .