On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol
暂无分享,去创建一个
[1] Lawrence C. Paulson,et al. Mechanical Proofs about a Non-repudiation Protocol , 2001, TPHOLs.
[2] Jean-François Raskin,et al. A game-based verification of non-repudiation and fair exchange protocols , 2003 .
[3] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[4] Jianying Zhou,et al. An Intensive Survey of Non-Repudiation Protocols , 2002 .
[5] Jan Friso Groote,et al. The Syntax and Semantics of μCRL , 1995 .
[6] Muhammad Torabi Dashti,et al. An intruder model for verifying termination in security protocols , 2005 .
[7] Colin Boyd,et al. Exploring Fair Exchange Protocols Using Specification Animation , 2000, ISW.
[8] Mihaela Sighireanu,et al. Efficient on-the-fly model-checking for regular alternation-free mu-calculus , 2003, Sci. Comput. Program..
[9] Jianying Zhou,et al. On the Security of a Multi-party Certified Email Protocol , 2004, ICICS.
[10] Vitaly Shmatikov,et al. Finite-state analysis of two contract signing protocols , 2002, Theor. Comput. Sci..
[11] Radu Mateescu,et al. Efficient Diagnostic Generation for Boolean Equation Systems , 2000, TACAS.
[12] S. Lindell,et al. The Dolev-Yaho Intruder is the Most Powerful Attacker , 2001, LICS 2001.
[13] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[14] Muhammad Torabi Dashti,et al. An intruder model for verifying liveness in security protocols , 2006, FMSE '06.
[15] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[16] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[17] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[18] Nadarajah Asokan,et al. Fairness in electronic commerce , 1998, Research report / RZ / IBM / IBM Research Division / Zürich Research Laboratory.
[19] Josep Lluís Ferrer-Gomila,et al. A Realistic Protocol for Multi-party Certified Electronic Mail , 2002, ISC.
[20] Alain Kerbrat,et al. CADP - A Protocol Validation and Verification Toolbox , 1996, CAV.
[21] Carsten Rudolph,et al. On the security of fair non-repudiation protocols , 2003, International Journal of Information Security.
[22] Henning Pagnia,et al. On the Impossibility of Fair Exchange without a Trusted Third Party , 1999 .