Strand spaces: proving security protocols correct

被引:0
|
作者
MITRE Corp, Bedford, MA, United States [1 ]
机构
来源
J Computer Secur | / 2卷 / 191-230期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Proving concurrent constraint programs correct
    DeBoer, FS
    Gabbrielli, M
    Marchiori, E
    Palamidessi, C
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1997, 19 (05): : 685 - 725
  • [32] Proving concurrent constraint programs correct
    Universiteit Utrecht, Utrecht, Netherlands
    ACM Trans Program Lang Syst, 5 (685-725):
  • [33] Provably correct Java']Java implementations of Spi Calculus security protocols specifications
    Pironti, Alfredo
    Sisto, Riccardo
    COMPUTERS & SECURITY, 2010, 29 (03) : 302 - 314
  • [34] PROVING PROGRAMS CORRECT - ANDERSON,RB
    EVELYN, D
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1980, 31 (02) : 198 - 198
  • [35] A formal method for proving programs correct
    Chiang, CC
    Neubart, D
    2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 718 - 723
  • [36] Structural control operators for composing diagrams of strand spaces of concurrent cryptographic protocols
    Wang, Huanbao
    Zhang, Yousheng
    Li, Yuan
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 1726 - 1730
  • [37] The security analysis for ad hoc routing protocols based on improved strand space
    Wang, Ying-long
    Wang, Ji-zhi
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 585 - +
  • [38] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving
    Pourpouneh, Mohsen
    Ramezanian, Rasoul
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
  • [39] A comparison between strand spaces and multiset rewriting for security protocol analysis
    Cervesato, Iliano
    Durgin, Nancy A.
    Lincoln, Patrick D.
    Mitchell, John C.
    Scedrov, Andre
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (02) : 265 - 316
  • [40] A comparison between strand spaces and multiset rewriting for security protocol analysis
    Cervesato, I
    Durgin, N
    Lincoln, P
    Mitchel, J
    Scedrov, A
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 356 - 383