Formal Analysis for Cryptographic Protocols on a Trace Semantics
暂无分享,去创建一个
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[3] Yong Li,et al. Checking Temporal Duration Properties of timed automata , 2008, Journal of Computer Science and Technology.
[4] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[5] Gerard J. Holzmann,et al. The SPIN Model Checker - primer and reference manual , 2003 .
[6] Riccardo Sisto,et al. Using SPIN to Verify Security Properties of Cryptographic Protocols , 2002, SPIN.