[PDF][PDF] 安全协议20 年研究进展

卿斯汉 - 软件学报, 2003 - jos.org.cn
安全协议20 年研究进展 Page 1 Vol.14, No.10 ©2003 Journal of Software 软件学报 1000-9825/2003/14(10)1740
安全协议20 年研究进展 ∗ 卿斯汉+ (中国科学院信息安全技术工程研究中心,北京100080) (中国 …

Strand spaces: Proving security protocols correct

FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Strand spaces: Why is a security protocol correct?

FJT Fábrega, JC Herzog… - Proceedings. 1998 IEEE …, 1998 - ieeexplore.ieee.org
A strand is a sequence of events; it represents either the execution of an action by a
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Constraint solving for bounded-process cryptographic protocol analysis

J Millen, V Shmatikov - Proceedings of the 8th ACM conference on …, 2001 - dl.acm.org
Constraint solving for bounded-process cryptographic protocol analysis Page 1 Constraint
Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly …

Towards a completeness result for model checking of security protocols

G Lowe - Journal of computer security, 1999 - content.iospress.com
Abstract Model checking approaches to the analysis of security protocols have proved
remarkably successful. The basic approach is to produce a model of a small system running …

Athena: A novel approach to efficient automatic security protocol analysis

DX Song, S Berezin, A Perrig - Journal of Computer Security, 2001 - content.iospress.com
We propose a new efficient automatic verification technique, Athena, for security protocol
analysis. It uses a new efficient representation–our extension to the Strand Space Model …

The logic of authentication protocols

P Syverson, I Cervesato - International school on foundations of security …, 2000 - Springer
The rationale of authentication has been a topic of study for about a decade and a half. First
attempts at formal analysis of authentication protocols were not using logics per se, but were …

[PDF][PDF] On preventing replay attacks on security protocols

S Malladi, J Alves-Foss, RB Heckendorn - Proc. International Conference …, 2002 - Citeseer
Replay attacks on security protocols have been dis-cussed for quite some time in the
literature. However, the efforts to address these attacks have been largely incomplete …