The application of model checking for securing e-commerce transactions
暂无分享,去创建一个
James V. Hansen | Paul Benjamin Lowry | Bonnie Brinton Anderson | Scott L. Summers | P. Lowry | S. Summers | B. Anderson | J. Hansen
[1] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[2] Paul Benjamin Lowry,et al. Model Checking for E-Commerce Control and Assurance , 2005 .
[3] A. W. Roscoe. CSP and determinism in security modelling , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[4] Jeannette M. Wing,et al. Model checking electronic commerce protocols , 1996 .
[5] Andrew B. Whinston,et al. E-Process Design and Assurance Using Model Checking , 2000, Computer.
[6] Benjamin Cox,et al. NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.
[7] Heiko Schuldt,et al. Execution Guarantees in Electronic Commerce Payments , 1999, FMLDO.
[8] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[9] Indrajit Ray,et al. Failure analysis of an e-commerce protocol using model checking , 2000, Proceedings Second International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2000.
[10] James V. Hansen,et al. Model checking for design and assurance of e-Business processes , 2005, Decis. Support Syst..
[11] James V. Hansen,et al. Model checking for E-business control and assurance , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[12] Indrajit Ray,et al. A Fair-exchange E-commerce Protocol with Automated Dispute Resolution , 2000, DBSec.
[13] J. Doug Tygar,et al. Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce , 1998, VLDB.