Property verification for authentication protocols
暂无分享,去创建一个
[1] Jacob A. Abraham,et al. Automated verification of temporal properties specified as state machines in VHDL , 1995, Proceedings. Fifth Great Lakes Symposium on VLSI.
[2] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[3] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[4] J. David Irwin,et al. Digital Logic Circuit Analysis and Design , 1995 .
[5] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[6] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.