Protocol Specification and Verification of Security Properties : A General Approach
暂无分享,去创建一个
[1] Jonathan Millen. A Necessarily Parallel Attack , 1999 .
[2] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[3] Lawrence C. Paulson,et al. Inductive analysis of the Internet protocol TLS , 1999, TSEC.
[4] J. Grundy,et al. Theorem Proving in Higher Order Logics: 11th International Conference, TPHOLs'98, Canberra, Australia, September 27 - October 1, 1998, Proceedings , 1998 .
[5] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[6] Robin Milner,et al. Operational and Algebraic Semantics of Concurrent Processes , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[7] Leslie Lamport,et al. The temporal logic of actions , 1994, TOPL.
[8] Sjouke Mauw,et al. Message Sequence Chart (MSC) , 1996 .
[9] Charalampos Manifavas,et al. NetCard - A Practical Electronic-Cash System , 1996, Security Protocols Workshop.
[10] Marieke Huisman,et al. A Comparison of PVS and Isabelle/HOL , 1998, TPHOLs.
[11] Somesh Jha,et al. Model Checking for Security Protocols , 1997 .
[12] John Rushby,et al. Specification, Proof Checking, and Model Checking for Protocols and Distributed Systems with PVS , 1997 .