共 10 条
- [1] Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 77 (1-2): : 60 - 91
- [2] Flow logic for Dolev-Yao secrecy in cryptographic processes FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (06): : 747 - 756
- [3] Symmetric encryption in a simulatable Dolev-Yao style cryptographic library 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 204 - 218
- [4] Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 404 - 423
- [6] Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model JOURNAL OF FORMALIZED REASONING, 2013, 6 (01): : 31 - 61
- [7] A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 89 - 108
- [8] Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover 2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 667 - 672
- [9] Detecting communication protocol security flaws by formal fuzz testing and machine learning FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 299 - 304
- [10] Soundness conditions for cryptographic algorithms and parameters abstractions in formal security protocol models DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 31 - 38