A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-Based Formal Analysis
暂无分享,去创建一个
[1] Lawrence Charles Paulson,et al. Isabelle: A Generic Theorem Prover , 1994 .
[2] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[3] Jingde Cheng,et al. FreeEnCal: A Forward Reasoning Engine with General-Purpose , 2007, KES.
[4] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[5] Jingde Cheng. A Strong Relevant Logic Model of Epistemic Processes in Scientific Discovery (Extended Abstract) , 1999, PAKDD.
[6] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[7] Jingde Cheng,et al. Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[8] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[9] Jingde Cheng,et al. Formalization for Formal Analysis of Cryptographic Protocols with Reasoning Approach , 2014 .
[10] Colin Boyd,et al. Goals for Authentication and Key Establishment , 2003 .
[11] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[12] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.