A logic of communication in hostile environment
暂无分享,去创建一个
[1] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[2] Glenn H. MacEwen,et al. Reasoning about Knowledge and Permission in Secure Distributed Systems , 1988, CSFW.
[3] P. Venkat Rangan,et al. An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[4] K. Mani Chandy,et al. How processes learn , 1985, ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing.
[5] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[6] Catherine A. Meadows,et al. Using narrowing in the analysis of key management protocols , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[7] Joseph Y. Halpern,et al. Knowledge and common knowledge in a distributed environment , 1984, JACM.
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Martín Abadi,et al. Authentication: A Practical Study in Belief and Action , 1988, TARK.
[10] J. Hintikka. Knowledge and belief , 1962 .
[11] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[12] M. Sato. A Study of Kripke-type Models for Some Modal Logics by Gentzen's Sequential Method , 1977 .
[13] Max J. Cresswell,et al. A New Introduction to Modal Logic , 1998 .