The Verification Logic for Secure Transaction Protocols
暂无分享,去创建一个
[1] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[2] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[3] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[4] Li Gong. Handling infeasible specifications of cryptographic protocols , 1991, Proceedings Computer Security Foundations Workshop IV.
[5] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[6] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[7] Stephen H. Brackin,et al. A HOL extension of GNY for automatically analyzing cryptographic protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[8] Catherine A. Meadows,et al. A Formal Specification of Requirements for Payment Transactions in the SET Protocol , 1998, Financial Cryptography.
[9] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[10] Tad Hogg,et al. Enhancing privacy and trust in electronic communities , 1999, EC '99.
[11] Heike Neumann,et al. A Sound Logic for Analysing Electronic Commerce Protocols , 1998, ESORICS.
[12] Diomidis Spinellis,et al. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification , 1999, Comput. Commun..