Non-repudiation analysis using LySa with annotations
暂无分享,去创建一个
[1] Muhammad Torabi Dashti,et al. On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol , 2005, ICICS.
[2] Dieter Gollmann,et al. Evidence and non-repudiation , 1997 .
[3] Lawrence C. Paulson,et al. Mechanical Proofs about a Non-repudiation Protocol , 2001, TPHOLs.
[4] Pierpaolo Degano,et al. Detecting and Preventing Type flaws: a Control Flow Analysis with Tags , 2007, Electron. Notes Theor. Comput. Sci..
[5] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..
[6] Flemming Nielson,et al. Automated Analysis of Security in Networking Systems , 2004 .
[7] Steve A. Schneider,et al. Formal analysis of a non-repudiation protocol , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[8] Hanne Riis Nielson,et al. A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols , 2007, ASIAN.
[9] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[10] Pierpaolo Degano,et al. A Formal Analysis of Complex Type Flaw Attacks on Security Protocols , 2008, AMAST.
[11] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[12] Jean-François Raskin,et al. A game-based verification of non-repudiation and fair exchange protocols , 2003 .
[13] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Hanne Riis Nielson,et al. Analysis of LYSA-calculus with explicit confidentiality annotations , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[16] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[17] Steve A. Schneider. Modelling security properties with CSP , 1996 .
[18] Dieter Gollmann,et al. Towards Verification of Non-repudiation Protocols , 1998 .