Automatic verification of the TLS handshake protocol
暂无分享,去创建一个
Gregorio Díaz | Valentín Valero Ruiz | Fernando López Pelayo | Fernando Cuartero | F. L. Pelayo | F. Cuartero | Gregorio Díaz | V. V. Ruiz
[1] Vitaly Shmatikov,et al. Finite-State Analysis of SSL 3.0 , 1998, USENIX Security Symposium.
[2] Lawrence C. Paulson,et al. Inductive analysis of the Internet protocol TLS , 1999, TSEC.
[3] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[4] Wang Yi,et al. Efficient verification of real-time systems: compact data structure and state-space reduction , 1997, Proceedings Real-Time Systems Symposium.
[5] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[6] Gavin Lowe,et al. On Distributed Security Transactions that use Secure Transport Protocols , 2003 .
[7] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[8] Wang Yi,et al. Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.
[9] A. W. Roscoe,et al. Proving security protocols with model checkers by data independence techniques , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[10] Jakob Jonsson,et al. On the Security of RSA Encryption in TLS , 2002, CRYPTO.
[11] Dominique Bolignano. Towards the formal verification of electronic commerce protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.