Strand spaces: proving security protocols correct

被引:0
|
作者
MITRE Corp, Bedford, MA, United States [1 ]
机构
来源
J Computer Secur | / 2卷 / 191-230期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Relating strand spaces and distributed temporal logic for security protocol analysis
    Caleiro, Carlos
    Vigano, Luca
    Basin, David
    LOGIC JOURNAL OF THE IGPL, 2005, 13 (06) : 637 - 663
  • [42] CORRECT SPACES
    EFREMOVI.VA
    MORDKOVI.AG
    SANDBERG, VY
    DOKLADY AKADEMII NAUK SSSR, 1967, 172 (06): : 1254 - &
  • [43] SPECIFYING AND PROVING COMMUNICATION CLOSEDNESS IN PROTOCOLS
    JANSSEN, W
    ZWIERS, J
    PROTOCOL SPECIFICATION, TESTING AND VERIFICATION, XIII, 1993, 16 : 323 - 339
  • [44] Proving Quicksort Correct in Event-B
    Hallerstede, Stefan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 259 : 47 - 65
  • [45] IronFleet: Proving Practical Distributed Systems Correct
    Hawblitzel, Chris
    Howell, Jon
    Kapritsos, Manos
    Lorch, Jacob R.
    Parno, Bryan
    Roberts, Michael L.
    Setty, Srinath
    Zill, Brian
    SOSP'15: PROCEEDINGS OF THE TWENTY-FIFTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2015, : 1 - 17
  • [46] SOFTWARE RELIABILITY THROUGH PROVING PROGRAMS CORRECT
    LONDON, RL
    COMPUTER, 1971, 4 (01) : 44 - &
  • [47] Proving MCAPI Executions Are Correct using SMT
    Huang, Yu
    Mercer, Eric
    McCarthy, Jay
    2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 26 - 36
  • [48] Proving Highly-Concurrent Traversals Correct
    Feldman, Yotam M. Y.
    Khyzha, Artem
    Enea, Constantin
    Morrison, Adam
    Nanevski, Aleksandar
    Rinetzky, Noam
    Shoham, Sharon
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2020, 4 (OOPSLA):
  • [49] Proving Concurrent Constraint Programming Correct, Revisited
    Olarte, Carlos
    Pimentel, Elaine
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2015, 312 : 179 - 195
  • [50] A Method for Proving Unlinkability of Stateful Protocols
    Baelde, David
    Delaune, Stephanie
    Moreau, Solene
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 169 - 183