Security Analysis of RFID Authentication for Pervasive Systems using Model Checking
暂无分享,去创建一个
[1] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[2] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[3] Lawrence C. Paulson,et al. Relations Between Secrets: Two Formal Analyses of the Yahalom Protocol , 2001, J. Comput. Secur..
[4] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[6] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[7] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[8] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[9] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.