Actor-Network Procedures - (Extended Abstract)
暂无分享,去创建一个
[1] Dusko Pavlovic,et al. Deriving, Attacking and Defending the GDOI Protocol , 2004, ESORICS.
[2] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[3] Jaap-Henk Hoepman. Ephemeral Pairing on Anonymous Networks , 2005, SPC.
[4] Dusko Pavlovic,et al. Maps II: Chasing Diagrams in Categorical Proof Theory , 1996, Log. J. IGPL.
[5] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[6] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[7] B. Palsson. Systems Biology: Properties of Reconstructed Networks , 2006 .
[8] Joshua D. Guttman,et al. Searching for Shapes in Cryptographic Protocols , 2007, TACAS.
[9] K. Brown,et al. Graduate Texts in Mathematics , 1982 .
[10] Dusko Pavlovic. Proving Authentication Properties in the Protocol Derivation Assistant , 2006 .
[11] Somesh Jha,et al. Model Checking for Security Protocols , 1997 .
[12] Gabrielle Durepos. Reassembling the Social: An Introduction to Actor‐Network‐Theory , 2008 .
[13] Dusko Pavlovic,et al. Deriving secrecy properties in key establishment protocols , 2006 .
[14] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[15] Bruno Blanchet,et al. A Computationally Sound Mechanized Prover for Security Protocols , 2008, IEEE Transactions on Dependable and Secure Computing.
[16] John C. Mitchell,et al. A derivation system for security protocols and its logical formalization , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[17] Dusko Pavlovic,et al. Composition and refinement of behavioral specifications , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[18] Dusko Pavlovic,et al. An encapsulated authentication logic for reasoning about key distribution protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[19] Serge Vaudenay,et al. SAS-Based Authenticated Key Agreement , 2006, Public Key Cryptography.
[20] Albert-László Barabási,et al. Evolution of Networks: From Biological Nets to the Internet and WWW , 2004 .
[21] Vaughan R. Pratt,et al. Modeling concurrency with partial orders , 1986, International Journal of Parallel Programming.
[22] Matt Blaze. Toward a Broader View of Security Protocols , 2004, Security Protocols Workshop.
[23] John C. Mitchell,et al. Secure protocol composition , 2003, FMSE '03.
[24] A. W. Roscoe,et al. Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey , 2011, J. Comput. Secur..
[25] Dieter Gollmann,et al. Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.
[26] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[27] Serge Vaudenay,et al. Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.
[28] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[29] Arun Kumar,et al. Article in Press Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing a Comparative Study of Secure Device Pairing Methods , 2022 .
[30] Sergey N. Dorogovtsev,et al. Evolution of Networks: From Biological Nets to the Internet and WWW (Physics) , 2003 .
[31] Dusko Pavlovic,et al. Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol , 2010, MFPS.
[32] John C. Mitchell,et al. A compositional logic for protocol correctness , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[33] Dieter Gollmann,et al. Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings , 2006, ESORICS.
[34] Dusko Pavlovic,et al. Guarded Transitions in Evolving Specifications , 2002, AMAST.
[35] Carl M. Ellison,et al. Ceremony Design and Analysis , 2007, IACR Cryptol. ePrint Arch..
[36] John C. Mitchell,et al. A derivation system and compositional logic for security protocols , 2005, J. Comput. Secur..
[37] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[38] Wolter Pieters,et al. Representing Humans in System Security Models: An Actor-Network Approach , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[39] John C. Mitchell,et al. A Compositional Logic for Proving Security Properties of Protocols , 2003, J. Comput. Secur..
[40] Mark Newman,et al. Networks: An Introduction , 2010 .
[41] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[42] Sven Laur,et al. Efficient Mutual Data Authentication Using Manually Authenticated Strings , 2006, CANS.
[43] Mark Manulis,et al. Cryptology and Network Security , 2012, Lecture Notes in Computer Science.
[44] Véronique Cortier,et al. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems , 2011, Journal of Automated Reasoning.
[45] Benjamin Grégoire,et al. A Machine-Checked Formalization of Sigma-Protocols , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[46] Desmond Fearnley-Sander,et al. Universal Algebra , 1982 .
[47] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[48] Catherine A. Meadows. Deriving Ephemeral Authentication Using Channel Axioms , 2009, Security Protocols Workshop.
[49] Bruce Christianson,et al. Multichannel Protocols to Prevent Relay Attacks , 2010, Financial Cryptography.
[50] Steven J. Murdoch,et al. Optimised to Fail: Card Readers for Online Banking , 2009, Financial Cryptography.
[51] W. Marsden. I and J , 2012 .
[52] David A. Wagner,et al. Conditioned-safe ceremonies and a user study of an application to web authentication , 2009, NDSS.
[53] Dusko Pavlovic,et al. Deriving Secrecy in Key Establishment Protocols , 2006, ESORICS.
[54] Sven Laur,et al. User-aided data authentication , 2009, Int. J. Secur. Networks.
[55] C. Peltz,et al. Web Services Orchestration and Choreography , 2003, Computer.
[56] Radha Poovendran,et al. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.
[57] S. Maclane,et al. Categories for the Working Mathematician , 1971 .