Strand spaces: proving security protocols correct
暂无分享,去创建一个
[1] U. Carlsen,et al. Cryptographic protocol flaws: know your enemy , 1994, Proceedings The Computer Security Foundations Workshop VII.
[2] John A. Clark,et al. On the Security of Recent Protocols , 1995, Inf. Process. Lett..
[3] Joseph Y. Halpern,et al. Reasoning about knowledge: a survey , 1995 .
[4] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[5] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[6] A. W. Roscoe. Intensional specifications of security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[7] Martín Abadi,et al. Reasoning about Cryptographic Protocols in the Spi Calculus , 1997, CONCUR.
[8] Alfred P. Maneki. Honest functions and their application to the analysis of cryptographic protocols , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[9] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[10] Sarvar Patel,et al. Number theoretic attacks on secure password schemes , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Lawrence C. Paulson,et al. Mechanized proofs for a recursive authentication protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.
[12] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[13] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[14] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[15] Simon S. Lam,et al. Verifying authentication protocols: methodology and example , 1993, 1993 International Conference on Network Protocols.
[16] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[17] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[18] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[19] Roberto Gorrieri,et al. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties , 1997, IEEE Trans. Software Eng..
[20] Steve A. Schneider. Verifying authentication protocols with CSP , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] Lawrence Charles Paulson,et al. Isabelle: A Generic Theorem Prover , 1994 .
[22] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[23] Ulf Carlsen,et al. Cryptographic Protocols Flaws , 1994, CSFW.
[24] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[25] Joshua D. Guttman,et al. Honest ideals on strand spaces , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[26] Adi Shamir,et al. On the Security of Ping-Pong Protocols when Implemented using the RSA , 1985, CRYPTO.
[27] Martín Abadi,et al. A logic of authentication , 1990, TOCS.