Rewriting-Based Verification of Authentication Protocols
暂无分享,去创建一个
[1] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[2] Kazuhiro Ogata,et al. Formal Analysis of Suzuki & Kasami Distributed Mutual Exclusion Algorithm , 2002, FMOODS.
[3] Joseph A. Goguen,et al. A hidden agenda , 2000, Theor. Comput. Sci..
[4] Steve A. Schneider. Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..
[5] Kazuhiro Ogata,et al. Modeling and verification of distributed real-time systems based on CafeOBJ , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[6] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[7] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[8] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[9] K. Mani Chandy,et al. Parallel program design - a foundation , 1988 .
[10] Razvan Diaconescu,et al. Behavioural Coherence in Object-Oriented Algebraic Specification , 2000, J. Univers. Comput. Sci..
[11] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[12] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[13] Joseph A. Goguen,et al. Web-Based Support for Cooperative Software Engineering , 2001, Ann. Softw. Eng..
[14] Jieh Hsiang,et al. Refutational Theorem Proving Using Term-Rewriting Systems , 1985, Artif. Intell..
[15] Joseph A. Goguen,et al. Software Engineering with Obj: Algebraic Specification In Action , 2010 .