A New Knowledge Representation Strategy for Cryptographic Protocol Analysis
暂无分享,去创建一个
Adriano Valenzano | Ivan Cibrario Bertolotti | Luca Durante | Riccardo Sisto | R. Sisto | L. Durante | A. Valenzano | I. Bertolotti
[1] Martín Abadi,et al. Computing symbolic models for verifying cryptographic protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[2] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[3] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[4] Somesh Jha,et al. Using state space exploration and a natural deduction style message derivation engine to verify security protocols , 1998, PROCOMET.
[5] Adriano Valenzano,et al. A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification , 2000, FORTE.
[6] Michele Boreale,et al. Symbolic Trace Analysis of Cryptographic Protocols , 2001, ICALP.
[7] Rocco De Nicola,et al. Proof techniques for cryptographic processes , 1999, Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158).
[8] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[9] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[10] Vitaly Shmatikov,et al. Constraint solving for bounded-process cryptographic protocol analysis , 2001, CCS '01.
[11] David A. McAllester. Automatic recognition of tractability in inference relations , 1993, JACM.
[12] D. Prawitz. Natural Deduction: A Proof-Theoretical Study , 1965 .
[13] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[14] Roberto M. Amadio,et al. On the Reachability Problem in Cryptographic Protocols , 2000, CONCUR.
[15] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[16] Antti Huima. Efficient Infinite-State Analysis of Security Protocols , 1999 .
[17] Somesh Jha,et al. Verifying security protocols with Brutus , 2000, TSEM.
[18] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).