Analysis Models for Security Protocols
暂无分享,去创建一个
In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model. Each extension considers a more realistic setting, closer to the real world, thus providing a stronger security guarantee. We provide examples both from the literature and from industrial case studies to show the practical applicability of each extension.
[1] Paul Syverson,et al. A formal language for cryptographic protocol requirements , 1996 .
[2] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[3] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.