Strand spaces: proving security protocols correct

被引:0
|
作者
MITRE Corp, Bedford, MA, United States [1 ]
机构
来源
J Computer Secur | / 2卷 / 191-230期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Proving security protocols correct
    Paulson, Lawrence C.
    Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
  • [2] Strand spaces: Why is a security protocol correct?
    Fabrega, FJT
    Herzog, JC
    Guttman, JD
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 160 - 171
  • [3] A Sub-graph of Strand Spaces in Security Protocols
    Wang, Huanbao
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 207 - 210
  • [4] Research on the Network Security Protocols based on the Strand Spaces Theory
    Liu, Baoju
    Wang, Jianxi
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 1134 - 1138
  • [5] Proving properties of security protocols by induction
    Paulson, LC
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 70 - 83
  • [6] Logic of Events for Proving Security Properties of Protocols
    Xiao, Meihua
    Bickford, Mark
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 519 - +
  • [7] State and Progress in Strand Spaces: Proving Fair Exchange
    Joshua D. Guttman
    Journal of Automated Reasoning, 2012, 48 : 159 - 195
  • [8] State and Progress in Strand Spaces: Proving Fair Exchange
    Guttman, Joshua D.
    JOURNAL OF AUTOMATED REASONING, 2012, 48 (02) : 159 - 195
  • [9] Metric Strand Spaces for Locale Authentication Protocols
    Thayer, F. Javier
    Swarup, Vipin
    Guttman, Joshua D.
    TRUST MANAGEMENT IV, 2010, 321 : 79 - 94
  • [10] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
    Hess, Andreas Viktor
    Modersheim, Sebastian
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463