Computational Semantics of a Verification Logic of Local Sessions
暂无分享,去创建一个
[1] Jonathan Herzog,et al. A computational interpretation of Dolev-Yao adversaries , 2005, Theor. Comput. Sci..
[2] Kaile Su,et al. The DH exponentiation extension in a verification logic of local sessions , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[3] Véronique Cortier,et al. Computational soundness of observational equivalence , 2008, CCS.
[4] Vitaly Shmatikov,et al. Probabilistic Polynomial-Time Semantics for a Protocol Security Logic , 2005, ICALP.
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[7] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2000, Journal of Cryptology.
[8] Véronique Cortier,et al. Security proof with dishonest keys , 2012, IACR Cryptol. ePrint Arch..