Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
暂无分享,去创建一个
[1] Gavin Lowe,et al. How to prevent type flaw attacks on security protocols , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[2] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[3] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[4] U. Carlsen,et al. Cryptographic protocol flaws: know your enemy , 1994, Proceedings The Computer Security Foundations Workshop VII.
[5] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] J. van Leeuwen,et al. Foundations of Security Analysis and Design , 2001, Lecture Notes in Computer Science.
[7] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Tsutomu Matsumoto,et al. Incidence structures for key sharing , 1995 .
[9] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[10] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[11] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[12] Sebastian Mödersheim,et al. OFMC: A Symbolic Model-Checker for Security Protocols , 2004 .
[13] Vitaly Shmatikov,et al. Finite-state analysis of two contract signing protocols , 2002, Theor. Comput. Sci..
[14] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[15] Gerard J. Holzmann,et al. Design and validation of computer protocols , 1991 .
[16] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[17] Adi Shamir,et al. PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.
[18] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[19] Diomidis Spinellis,et al. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification , 1999, Comput. Commun..
[20] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[21] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[22] Michael Goldsmith. The perfect spy for model−checking crypto−protocols , 1997 .
[23] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[24] Cas J. F. Cremers. Feasibility of multi-protocol attacks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[25] Somesh Jha,et al. Verifying security protocols with Brutus , 2000, TSEM.
[26] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[27] Paul F. Syverson,et al. The Logic of Authentication Protocols , 2000, FOSAD.