Compositional verification of integrity for digital stream signature protocols
暂无分享,去创建一个
Roberto Gorrieri | Fabio Martinelli | Marinella Petrocchi | Anna Vaccarelli | F. Martinelli | M. Petrocchi | A. Vaccarelli | R. Gorrieri
[1] Roberto Gorrieri,et al. Non Interference for the Analysis of Cryptographic Protocols , 2000, ICALP.
[2] Roberto Gorrieri,et al. A Simple Language for Real-Time Cryptographic Protocol Analysis , 2003, ESOP.
[3] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[4] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[5] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[8] Myla Archer. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME , 2002 .
[9] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[11] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[12] Gavin Lowe,et al. Analysing a stream authentication protocol using model checking , 2002, International Journal of Information Security.
[13] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[14] Roberto Gorrieri,et al. A Classification of Security Properties , 1993 .
[15] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[16] Fabio Martinelli,et al. A Uniform Approach for the Definition of Security Properties , 1999, World Congress on Formal Methods.