Provable Implementations of Security Protocols
暂无分享,去创建一个
[1] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Robin Milner. Functions as Processes , 1990, ICALP.
[4] Dawn Xiaodong Song,et al. AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Andrew D. Gordon,et al. Verified Interoperable Implementations of Security Protocols , 2006, CSFW.
[7] Ernie Cohen. TAPS: a first-order verifier for cryptographic protocols , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[8] Rasmus Ejlers Møgelberg,et al. Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science , 2007 .
[9] Andrew D. Gordon,et al. Verifying policy-based security for web services , 2004, CCS '04.
[10] J. Hogg. Web service security : scenarios, patterns, and implementation guidance for Web services enhancements (WSE) 3.0 , 2005 .
[11] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[12] Andrew D. Gordon,et al. TulaFale: A Security Tool for Web Services , 2003, FMCO.
[13] Ross J. Anderson,et al. Programming Satan's Computer , 1995, Computer Science Today.
[14] Luca Durante,et al. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[15] Jean Goubault-Larrecq,et al. Cryptographic Protocol Analysis on Real C Code , 2005, VMCAI.