Embedding CSP in PVS: An Application to Authentication Protocols
暂无分享,去创建一个
[1] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[2] Steve A. Schneider,et al. Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol , 1996 .
[3] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[4] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[5] Peter B. Andrews. An introduction to mathematical logic and type theory - to truth through proof , 1986, Computer science and applied mathematics.
[6] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[7] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[8] Stephen H. Brackin. Deciding Cryptographic Protocol Adequacy with HOL: The Implementation , 1996, TPHOLs.
[9] Mandayam K. Srivas,et al. A Tutorial Introduction to PVS , 1998 .
[10] Lawrence C. Paulson. Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys , 1997 .
[11] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[12] Jonathan K. Millen,et al. The Interrogator model , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[13] Dieter Gollmann. What do we mean by entity authentication? , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] F. Javier Thayer. An Approach to Process Algebra using IMPS , 1995 .
[15] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[16] Natarajan Shankar,et al. Formal Verification for Fault-Tolerant Architectures: Prolegomena to the Design of PVS , 1995, IEEE Trans. Software Eng..
[17] Albert John Camilleri. Mechanizing CSP Trace Theory in Higher Order Logic , 1990, IEEE Trans. Software Eng..
[18] Andrew William Roscoe,et al. Model-checking CSP , 1994 .
[19] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] M. Gordon,et al. Introduction to HOL: a theorem proving environment for higher order logic , 1993 .
[22] William M. Farmer,et al. IMPS: An interactive mathematical proof system , 1990, Journal of Automated Reasoning.
[23] Lawrence C. Paulson,et al. A formulation of the simple theory of types (for Isabelle) , 1990, Conference on Computer Logic.
[24] Natarajan Shankar,et al. Towards a Duration Calculus Proof Assistant in PVS , 1994, FTRTFT.
[25] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.