On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol
暂无分享,去创建一个
[1] Carsten Rudolph,et al. Security analysis of efficient (Un-) fair non-repudiation protocols , 2004, Formal Aspects of Computing.
[2] Lawrence C. Paulson,et al. Mechanical Proofs about a Non-repudiation Protocol , 2001, TPHOLs.
[3] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[4] Robert H. Deng,et al. Evolution of Fair Non-repudiation with TTP , 1999, ACISP.
[5] Steve A. Schneider,et al. Formal analysis of a non-repudiation protocol , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[6] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[7] Carsten Rudolph,et al. Security Analysis of (Un-) Fair Non-repudiation Protocols , 2002, FASec.
[8] Susan Pancho. Paradigm shifts in protocol analysis , 1999 .
[9] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.