A Simple Language for Real-Time Cryptographic Protocol Analysis
暂无分享,去创建一个
[1] Roberto Gorrieri,et al. Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..
[2] Matthew Hennessy,et al. A Temporal Process Algebra , 1990, FORTE.
[3] Roberto Gorrieri,et al. A Classification of Security Properties , 1993 .
[4] Joshua D. Guttman,et al. Protocol independence through disjoint encryption , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[5] Roberto Gorrieri,et al. A comparison of three authentication properties , 2003, Theor. Comput. Sci..
[6] Gavin Lowe,et al. Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.
[7] Fabio Martinelli,et al. A Uniform Approach for the Definition of Security Properties , 1999, World Congress on Formal Methods.
[8] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[9] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[10] Roberto Gorrieri,et al. Secrecy in Security Protocols as Non Interference , 1999, Workshop on Secure Architectures and Information Flow.
[11] Irek Ulidowski,et al. Extending Process Languages with Time , 1997, AMAST.
[12] Jan Friso Groote,et al. Transition System Specifications with Negative Premises , 1993, Theor. Comput. Sci..
[13] Roberto Gorrieri,et al. Non Interference for the Analysis of Cryptographic Protocols , 2000, ICALP.
[14] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[15] Neil Evans,et al. Analysing Time Dependent Security Properties in CSP Using PVS , 2000, ESORICS.
[16] Nicoletta De Francesco,et al. Authenticity in a reliable protocol for mobile computing , 2003, SAC '03.
[17] Daniele Gorla,et al. On Compositional Reasoning in the Spi-calculus , 2002, FoSSaCS.
[18] Roberto Gorrieri,et al. A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..