A Formal Language for Cryptographic Protocol Requirements
暂无分享,去创建一个
[1] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[3] Martín Abadi. An Axiomatization of Lamport's Temporal Logic of Actions , 1990, CONCUR.
[4] Catherine A. Meadows,et al. Formal Requirements for Key Distribution Protocols , 1994, EUROCRYPT.
[5] Paul F. Syverson. On key distribution protocols for repeated authentication , 1993, OPSR.
[6] Chris J. Mitchell,et al. A security scheme for resource sharing over a network , 1990, Comput. Secur..
[7] Catherine A. Meadows,et al. A logical language for specifying cryptographic protocol requirements , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Catherine A. Meadows,et al. A system for the specification and analysis of key management protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[10] Virgil D. Gligor,et al. On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[12] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[13] Martín Abadi,et al. Rejoinder to Nessett , 1990, OPSR.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .
[16] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[17] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[18] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.