Intensional specifications of security protocols

被引:36
|
作者
Roscoe, AW [1 ]
机构
[1] UNIV OXFORD,COMP LAB,OXFORD OX1 3QD,ENGLAND
关键词
D O I
10.1109/CSFW.1996.503688
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:28 / 38
页数:11
相关论文
共 50 条
  • [1] Security protocols and specifications
    Abadi, M
    [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
  • [2] ProToc-An Universal Language for Security Protocols Specifications
    Grosser, A.
    Kurkowski, M.
    Piatkowski, J.
    Szymoniak, S.
    [J]. SOFT COMPUTING IN COMPUTER AND INFORMATION SCIENCE, 2015, 342 : 237 - 248
  • [3] The layered games framework for specifications and analysis of security protocols
    Herzberg, Amir
    Yoffe, Igal
    [J]. THEORY OF CRYPTOGRAPHY, 2008, 4948 : 125 - 141
  • [4] On the semantics of Alice&Bob specifications of security protocols
    Caleiro, Carlos
    Vigano, Luca
    Basin, David
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 88 - 122
  • [5] Intensional Protocols for Dynamic Epistemic Logic
    van Lee, Hanna S.
    Rendsvig, Rasmus K.
    van Wijk, Suzanne
    [J]. JOURNAL OF PHILOSOPHICAL LOGIC, 2019, 48 (06) : 1077 - 1118
  • [6] Provably correct Java implementations of Spi Calculus security protocols specifications
    Politecnico di Torino, Dip. di Automatica e Informatica, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy
    [J]. Comput Secur, 3 (302-314):
  • [7] Intensional Protocols for Dynamic Epistemic Logic
    Hanna S. van Lee
    Rasmus K. Rendsvig
    Suzanne van Wijk
    [J]. Journal of Philosophical Logic, 2019, 48 : 1077 - 1118
  • [8] Overview security analysis of 3G authentication protocols and technical specifications
    Cao, Chenlei
    Zhang, Ru
    Niu, Xinxin
    Zhou, Linna
    Zhang, Zhentao
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
  • [9] Provably correct Java']Java implementations of Spi Calculus security protocols specifications
    Pironti, Alfredo
    Sisto, Riccardo
    [J]. COMPUTERS & SECURITY, 2010, 29 (03) : 302 - 314
  • [10] Experience report: How to extract security protocols' specifications from C libraries
    Sandoval, Itzel Vazquez
    Lenzini, Gabriele
    [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 719 - 724