Automated Design of Non-Repudiation Security Protocols
暂无分享,去创建一个
[1] John A. Clark,et al. Automated Design of Security Protocols , 2004, Comput. Intell..
[2] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[3] Paul Syverson,et al. Fail-Stop Protocols: An Approach to Designing Secure Protocols (Preprint) , 1995 .
[4] Panagiotis Louridas. Some guidelines for non-repudiation protocols , 2000, CCRV.
[5] John A. Clark,et al. Protocols are programs too: the meta-heuristic search for security protocols , 2001, Inf. Softw. Technol..
[6] John A. Clark,et al. Searching for a solution: engineering tradeoffs and the evolution of provably secure protocols , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[8] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[9] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[10] Simon N. Foley,et al. Fast automatic synthesis of security protocols using backward search , 2003, FMSE '03.
[11] Dawn Xiaodong Song,et al. A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.