A Unified Cryptographic Protocol Logic
暂无分享,去创建一个
[1] Jaakko Hintikka,et al. Knowledge and Belief: An Introduction to the Logic of the Two Notions. , 1965 .
[2] Hans Hermes,et al. Introduction to mathematical logic , 1973, Universitext.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[5] Elliott Mendelson,et al. Introduction to Mathematical Logic , 1979 .
[6] Brian F. Chellas. Modal Logic: Normal systems of modal logic , 1980 .
[7] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[8] Hideki Imai,et al. ON SEEKING SMART PUBLIC-KEY-DISTRIBUTION SYSTEMS. , 1986 .
[9] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[10] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[11] Einar Snekkenes,et al. On The Formal Analysis of PKCS Authentication Protocols , 1990, AUSCRYPT.
[12] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] Yacov Yacobi. A Key Distribution "Paradox" , 1990, CRYPTO.
[14] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[15] Moti Yung,et al. Systematic Design of Two-Party Authentication Protocols , 1991, CRYPTO.
[16] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[17] Virgil D. Gligor,et al. On belief evolution in authentication protocols , 1991, Proceedings Computer Security Foundations Workshop IV.
[18] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Paul F. Syverson,et al. Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols , 1992, J. Comput. Secur..
[21] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[22] E. Snekkenes. Roles in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[23] Ulf Carlsen. Using Logics to Detect Implementation-Dependent Flaws , 1993 .
[24] Colin Boyd,et al. Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[25] Paul F. Syverson. Adding time to a logic of authentication , 1993, CCS '93.
[26] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[27] Paul F. Syverson. On key distribution protocols for repeated authentication , 1993, OPSR.
[28] Paul C. van Oorschot,et al. An Alternate Explanation of two BAN-logic "failures" , 1994, EUROCRYPT.
[29] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[30] Gavin Lowe,et al. Some new attacks upon security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.