Formal Analysis of the NetBill Electronic Commerce Protocol
暂无分享,去创建一个
[1] Kazuhiro Ogata,et al. Formal Analysis of the iKP Electronic Payment Protocols , 2002, ISSS.
[2] Kazuhiro Ogata,et al. Formal Verification of the Horn-Preneel Micropayment Protocol , 2003, VMCAI.
[3] Benjamin Cox,et al. NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.
[4] Fabio Massacci,et al. Formal Verification of Cardholder Registration in SET , 2000, ESORICS.
[5] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[6] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[7] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[8] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[9] Lawrence C. Paulson,et al. Inductive analysis of the Internet protocol TLS , 1999, TSEC.
[10] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[11] Kazuhiro Ogata,et al. Rewriting-Based Verification of Authentication Protocols , 2002, Electron. Notes Theor. Comput. Sci..
[12] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[13] Jeannette M. Wing,et al. Model checking electronic commerce protocols , 1996 .
[14] Kazuhiro Ogata,et al. Flaw and modification of the iKP electronic payment protocols , 2003, Inf. Process. Lett..
[15] Fabio Massacci,et al. Verifying the SET registration protocols , 2003, IEEE J. Sel. Areas Commun..
[16] Kazuhiro Ogata,et al. Proof Scores in the OTS/CafeOBJ Method , 2003, FMOODS.
[17] Fabio Massacci,et al. The verification of an industrial payment protocol: the SET purchase phase , 2002, CCS '02.