Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking
暂无分享,去创建一个
[1] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[2] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[3] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[4] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[5] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[6] Joshua Hill,et al. An Analysis of the RADIUS Authentication Protocol , 2006 .
[7] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[8] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[9] Alan D. Ross,et al. Network Security Essentials , 2003 .