Formal verification of cryptographic protocols: A survey

CA Meadows, CA Meadows - International Conference on the Theory and …, 1994 - Springer
Formal verification of cryptographic protocols: A survey Page 1 INVITED LECTURE 2 Catherine
Meadows (Naval Research Laboratory, USA) Page 2 Page 3 Formal Verification of …

[图书][B] Fail-stop protocols: An approach to designing secure protocols

L Gong, X Qian - 1994 - Citeseer
This paper presents a methodology to facilitate the design and analysis of secure
cryptographic protocols. This work is based on a novel notion of a fail-stop protocol, which …

[图书][B] Some remarks on the logic of Gong, Needham and Yahalom

A Mathuria, R Safani-Naini, P Nickolas - 1994 - Citeseer
We reveal instances of unsoundness, incompleteness, and redundancy in the cryptographic
protocol analysis logic of Gong, Needham and Yahalom. Solutions are proposed for each of …

[PS][PS] SOFTWARE VERIFICATION RESEARCH CENTRE

CJ Fidge - 1994 - espace.library.uq.edu.au
Computer software now controls critical systems worldwide. International standards require
such programs to be produced from mathematically-precise specifications, but the …