A Method for Proving Observational Equivalence
暂无分享,去创建一个
[1] Joost Engelfriet,et al. Determinacy - (Observation Equivalence = Trace Equivalence) , 1985, Theor. Comput. Sci..
[2] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[3] Mathieu Baudet,et al. Sécurité des protocoles cryptographiques : aspects logiques et calculatoires. (Security of cryptographic protocols : logical and computational aspects) , 2007 .
[4] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[5] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[6] Mark Ryan,et al. Symbolic bisimulation for the applied pi calculus , 2007, J. Comput. Secur..
[7] Martín Abadi,et al. Deciding knowledge in security protocols under equational theories , 2006, Theor. Comput. Sci..
[8] Véronique Cortier,et al. Computational soundness of observational equivalence , 2008, CCS.
[9] Martín Abadi,et al. Automated verification of selected equivalences for security protocols , 2005, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05).
[10] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[11] Michaël Rusinowitch,et al. Protocol insecurity with finite number of sessions is NP-complete , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[12] Vitaly Shmatikov,et al. Constraint solving for bounded-process cryptographic protocol analysis , 2001, CCS '01.
[13] Scott A. Smolka,et al. CCS expressions, finite state processes, and three problems of equivalence , 1983, PODC '83.
[14] Roberto M. Amadio,et al. On the symbolic reduction of processes with cryptographic functions , 2001, LACPV@CAV.
[15] John C. Mitchell,et al. Undecidability of bounded security protocols , 1999 .
[16] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[17] Mathieu Baudet,et al. Deciding security of protocols against off-line guessing attacks , 2005, CCS '05.
[18] Inria Saclay,et al. A method for proving observational equivalence , 2009 .
[19] Adriano Valenzano,et al. Automatic testing equivalence verification of spi calculus specifications , 2003, TSEM.
[20] Rocco De Nicola,et al. Proof techniques for cryptographic processes , 1999, Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158).
[21] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[22] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[23] Bruno Blanchet,et al. Automatic proof of strong secrecy for security protocols , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[24] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .