Embedding agents within the intruder to detect parallel attacks
暂无分享,去创建一个
[1] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[2] Andrew William Roscoe,et al. Proving security protocols with model checkers by data independence techniques , 1999 .
[3] Bruno Blanchet,et al. From Secrecy to Authenticity in Security Protocols , 2002, SAS.
[4] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[5] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[6] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[7] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Steve A. Schneider. Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..
[9] A. W. Roscoe,et al. Capturing parallel attacks within the data independence framework , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[10] A. W. Roscoe,et al. Automating Data Independence , 2000, ESORICS.
[11] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[12] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[13] A. W. Roscoe,et al. Proving security protocols with model checkers by data independence techniques , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[14] Gavin Lowe,et al. Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.
[15] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[16] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[17] Dawn Xiaodong Song,et al. Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..
[18] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..