Verifying Privacy by Little Interaction and No Process Equivalence
暂无分享,去创建一个
[1] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[2] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[3] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[4] Giampaolo Bella,et al. Formal Correctness of Security Protocols , 2007 .
[5] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[6] Mark Ryan,et al. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster , 2010, Towards Trustworthy Elections.
[7] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[8] Giampaolo Bella,et al. Formal Correctness of Security Protocols (Information Security and Cryptography) , 2007 .
[9] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[10] Martín Abadi,et al. Automated verification of selected equivalences for security protocols , 2005, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05).
[11] Lawrence C. Paulson,et al. Verifying multicast-based security protocols using the inductive method , 2013, SAC '13.
[12] Mark Ryan,et al. Automatic Verification of Privacy Properties in the Applied pi Calculus , 2008, IFIPTM.
[13] Andreas Podelski,et al. Verification of cryptographic protocols: tagging enforces termination , 2003, Theor. Comput. Sci..