Formal Security Verification of Industry 4.0 Applications
暂无分享,去创建一个
[1] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[2] K. Pattabiraman,et al. IOT : Formal Security Analysis of Smart Embedded Systems , 2016 .
[3] John A. Clark,et al. A Survey of Authentication Protocol Literature , 2010 .
[4] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[5] Narciso Martí-Oliet,et al. All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic , 2007, All About Maude.
[6] José Meseguer,et al. Conditioned Rewriting Logic as a United Model of Concurrency , 1992, Theor. Comput. Sci..
[7] José Meseguer,et al. Twenty years of rewriting logic , 2010, J. Log. Algebraic Methods Program..
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Armin Biere,et al. Bounded model checking , 2003, Adv. Comput..
[10] Patrick D. McDaniel,et al. Soteria: Automated IoT Safety and Security Analysis , 2018, USENIX Annual Technical Conference.
[11] Riccardo Muradore,et al. A Formal Approach to Cyber-Physical Attacks , 2016, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[12] Sebastian Mödersheim,et al. OFMC: A Symbolic Model-Checker for Security Protocols , 2004 .