A logical language for specifying cryptographic protocol requirements
暂无分享,去创建一个
[1] Virgil D. Gligor,et al. On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[3] Martín Abadi. An Axiomatization of Lamport's Temporal Logic of Actions , 1990, CONCUR.
[4] Chris J. Mitchell,et al. A security scheme for resource sharing over a network , 1990, Comput. Secur..
[5] Catherine A. Meadows,et al. A system for the specification and analysis of key management protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Martín Abadi,et al. Rejoinder to Nessett , 1990, OPSR.
[8] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[9] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[10] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[11] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[12] Leslie Lamport,et al. The temporal logic of actions , 1994, TOPL.
[13] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..