Model checking of authentication protocols

被引:0
|
作者
Xu, Wei-Wen [1 ]
Lu, Xin-Da [1 ]
机构
[1] Dept. of Comp. Sci. and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Security of data
引用
收藏
页码:195 / 201
相关论文
共 50 条
  • [1] Modelling and checking timed authentication of security protocols
    Jakubowska, Gizela
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 363 - 378
  • [2] Model checking contractual protocols
    Daskalopulu, A
    LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2000, 64 : 35 - 47
  • [3] Model checking guarded protocols
    Emerson, EA
    Kahlon, V
    18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 361 - 370
  • [4] Model Checking Distributed Protocols in Must
    Enea, Constantin
    Giannakopoulou, Dimitra
    Kokologiannakis, Michalis
    Majumdar, Rupak
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (OOPSLA2):
  • [5] Model checking electronic commerce protocols
    Heintze, N
    Tygar, JD
    Wing, J
    Wong, HC
    PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, : 147 - 164
  • [6] LTL model checking for security Protocols
    Armando, Alessandro
    Carbone, Roberto
    Compagna, Luca
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 385 - +
  • [7] Model Checking Indistinguishability of Randomized Security Protocols
    Bauer, Matthew S.
    Chadha, Rohit
    Sistla, A. Prasad
    Viswanathan, Mahesh
    COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 : 117 - 135
  • [8] Analyzing interoperability of protocols using model checking
    Wu, P
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 453 - 457
  • [9] LDYIS: a Framework for Model Checking Security Protocols
    Lomuscio, Alessio
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2008, 85 (1-4) : 359 - 375
  • [10] Model Checking Quantum Key Distribution Protocols
    Huang, Baichuan
    Huang, Yan
    Kong, Jiaming
    Huang, Xin
    2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2016, : 611 - 615