Security Analysis of Parlay/OSA Framework
暂无分享,去创建一个
[1] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[2] Anthony Hall,et al. Seven myths of formal methods , 1990, IEEE Software.
[3] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[5] Guy Leduc. Verification of two versions of the challenge handshake authentication protocol (chap) , 2000, Ann. des Télécommunications.
[6] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[7] Sandro Etalle,et al. An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.
[8] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[9] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.