Cryptographic protocol analysis using goal extraction
暂无分享,去创建一个
[1] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[2] Jeannette M. Wing,et al. Model checking electronic commerce protocols , 1996 .
[3] Diomidis Spinellis,et al. Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools , 1997, SAFECOMP.
[4] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[5] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[6] Martín Abadi,et al. Reasoning about Cryptographic Protocols in the Spi Calculus , 1997, CONCUR.
[7] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[8] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[9] Xu,et al. Categorizing Attacks on Cryptographic Protocols Based on Intruders ' Objectives and RolesChong , 2000 .
[10] Catherine A. Meadows,et al. A model of computation for the NRL Protocol Analyzer , 1994, Proceedings The Computer Security Foundations Workshop VII.
[11] Sujeet Shenoi,et al. Integrating Logics and Process Calculi for Cryptographic Protocol Analysis , 2003, SEC.