On Modelling Real-time and Security properties of Distributed Systems (Extended Abstract)
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.
[2] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[3] Marcos A. Kiwi,et al. Strength of two data encryption standard implementations under timing attacks , 1998, TSEC.
[4] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[5] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[6] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[7] Joost-Pieter Katoen,et al. Modelling stochastic timed systems , 2001 .
[8] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[9] Wang Yi,et al. UPPAAL - Now, Next, and Future , 2000, MOVEP.
[10] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[11] Khawaja Amer Hayat,et al. Password Interception in a SSL/TLS Channel , 2004 .
[12] Sandro Etalle,et al. An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.
[13] Howard M. Heys,et al. A Timing Attack on RC5 , 1998, Selected Areas in Cryptography.
[14] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[15] Joost-Pieter Katoen,et al. MoDeST - A Modelling and Description Language for Stochastic Timed Systems , 2001, PAPM-PROBMIV.
[16] S. Hamilton,et al. Network Security Under Siege , 1996, Computer.
[17] Henk L. Muller,et al. Non-deterministic Processors , 2001, ACISP.
[18] Johan Agat,et al. Transforming out timing leaks , 2000, POPL '00.