Strand spaces: proving security protocols correct

被引:0
|
作者
MITRE Corp, Bedford, MA, United States [1 ]
机构
来源
J Computer Secur | / 2卷 / 191-230期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
    Song, Jiawen
    Xiao, Meihua
    Yang, Ke
    Wang, Xizhong
    Zhong, Xiaomei
    IEEE ACCESS, 2019, 7 : 59871 - 59883
  • [22] Provably correct Java implementations of Spi Calculus security protocols specifications
    Politecnico di Torino, Dip. di Automatica e Informatica, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy
    Comput Secur, 3 (302-314):
  • [23] Traces over topological spaces in concurrent security protocols
    Wang, H., 1600, Asian Network for Scientific Information (12):
  • [24] Fairness analysis of e-commerce protocols based on strand spaces
    Liu, Yichun
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 128 - 133
  • [25] A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space
    Li, Yongjian
    Jiang, Hongjian
    Zhao, Yongxin
    THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, TASE 2024, 2024, 14777 : 306 - 323
  • [26] Programming and Proving with Distributed Protocols
    Sergey, Ilya
    Wilcox, James R.
    Tatlock, Zachary
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2018, 2
  • [27] PROVING PROGRAMS CORRECT THROUGH REFINEMENT
    CORRELL, CH
    ACTA INFORMATICA, 1978, 9 (02) : 121 - 132
  • [28] EXERCISE IN PROVING PARALLEL PROGRAMS CORRECT
    GRIES, D
    COMMUNICATIONS OF THE ACM, 1977, 20 (12) : 921 - 930
  • [29] PROVING A COMPILER CORRECT - SIMPLE APPROACH
    GERMANO, G
    MAGGIOLOSCHETTINI, A
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1975, 10 (03) : 370 - 383
  • [30] Automatically proving concurrent programs correct
    Cook, Byron
    SEFM 2007: FIFTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2007, : 269 - 269