How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores
暂无分享,去创建一个
Rui Wang | Shaz Qadeer | XiaoFeng Wang | Shuo Chen | S. Qadeer | Xiaofeng Wang | Rui Wang | Shuo Chen
[1] Jonathan K. Millen,et al. The Interrogator model , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[2] Benjamin Cox,et al. NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.
[3] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[4] Danny Dolev,et al. On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.
[5] Andrew D. Gordon,et al. Modular verification of security protocol code by typing , 2010, POPL '10.
[6] N. Asokan,et al. Asynchronous protocols for optimistic fair exchange , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[7] Zheng Qiu-xia,et al. On Secure Electronic Transaction , 2006 .
[8] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[9] Catherine A. Meadows,et al. A Formal Specification of Requirements for Payment Transactions in the SET Protocol , 1998, Financial Cryptography.
[10] Shiyong Lu,et al. Model checking the secure electronic transaction (SET) protocol , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[11] V. N. Venkatakrishnan,et al. NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications , 2010, CCS '10.
[12] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[13] Vitaly Shmatikov,et al. Analysis of a Fair Exchange Protocol , 2000, NDSS.
[14] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[15] Benjamin Livshits,et al. Ripley: automatically securing web 2.0 applications through replicated execution , 2009, CCS.
[16] Christopher Krügel,et al. Toward Automated Detection of Logic Vulnerabilities in Web Applications , 2010, USENIX Security Symposium.
[17] José Meseguer,et al. A rewriting-based inference system for the NRL protocol analyzer: grammar generation , 2005, FMSE '05.
[18] Andrew D. Gordon,et al. TulaFale: A Security Tool for Web Services , 2003, FMCO.
[19] Xin Zheng,et al. Secure web applications via automatic partitioning , 2007, SOSP.
[20] Dominique Bolignano. Towards the formal verification of electronic commerce protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] Martín Abadi,et al. Security Protocols: Principles and Calculi , 2007, FOSAD.
[22] Martín Abadi,et al. Security protocols: principles and calculi tutorial notes , 2007 .
[23] Jeannette M. Wing,et al. Model checking electronic commerce protocols , 1996 .
[24] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[25] Steven J. Murdoch,et al. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication , 2010, Financial Cryptography.