Athena: a new efficient automatic checker for security protocol analysis
暂无分享,去创建一个
[1] John T. Kohl,et al. The Evolution of the Kerberos Authentication Service , 1992 .
[2] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Stephan Merz,et al. Model Checking , 2000 .
[4] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[5] Somesh Jha,et al. Using state space exploration and a natural deduction style message derivation engine to verify security protocols , 1998, PROCOMET.
[6] J. Doug Tygar,et al. A Model for Secure Protocols and Their Compositions , 1996, IEEE Trans. Software Eng..
[7] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[8] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[9] Somesh Jha,et al. Exploiting symmetry in temporal logic model checking , 1993, Formal Methods Syst. Des..
[10] Mihir Bellare,et al. iKP - A Family of Secure Electronic Payment Protocols , 1995, USENIX Workshop on Electronic Commerce.
[11] Catherine A. Meadows,et al. A model of computation for the NRL Protocol Analyzer , 1994, Proceedings The Computer Security Foundations Workshop VII.
[12] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[13] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[14] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[15] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[16] Jonathan K. Millen,et al. The Interrogator model , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[17] Vitaly Shmatikov,et al. Efficient finite-state analysis for large security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[18] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[19] Doron A. Peled. Combining Partial Order Reductions with On-the-fly Model-Checking , 1994, CAV.
[20] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[21] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[22] Jeannette M. Wing,et al. Fast, automatic checking of security protocols , 1996 .
[23] Doron A. Peled,et al. All from One, One for All: on Model Checking Using Representatives , 1993, CAV.
[24] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[25] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.