Intensional specifications of security protocols

被引:36
|
作者
Roscoe, AW [1 ]
机构
[1] UNIV OXFORD,COMP LAB,OXFORD OX1 3QD,ENGLAND
关键词
D O I
10.1109/CSFW.1996.503688
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:28 / 38
页数:11
相关论文
共 50 条
  • [21] Intensional Specifications of Truth-Conditions: 'Because', 'In Virtue of', and 'Made True ByaEuro¦aEuro™
    Vision, Gerald
    [J]. TOPOI-AN INTERNATIONAL REVIEW OF PHILOSOPHY, 2010, 29 (02): : 109 - 123
  • [22] From security protocols to systems security
    Monahan, B
    [J]. SECURITY PROTOCOLS, 2005, 3364 : 307 - 323
  • [23] Completing protocols synthesized from service specifications
    Takura, A
    Kanai, A
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1996, E79B (07) : 953 - 962
  • [24] A roadmap to autonomous of airlines: specifications and communication protocols
    Jafarzadeh, Hadi
    [J]. INTERNATIONAL JOURNAL OF SUSTAINABLE AVIATION, 2018, 4 (01) : 63 - 77
  • [25] SYNTHESIS OF PROTOCOL SPECIFICATIONS FOR DESIGN OF RESPONSIVE PROTOCOLS
    IGARASHI, H
    KAKUDA, Y
    KIKUNO, T
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1993, E76D (11) : 1375 - 1385
  • [26] Specifications and verification of network protocols by process algebra
    Ciobanu, G
    Sridhar, KN
    [J]. SEVENTH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, PROCEEDINGS, 2005, : 250 - 258
  • [27] RAPID PROTOTYPING OF PROTOCOLS FROM LOTOS SPECIFICATIONS
    VALENZANO, A
    SISTO, R
    CIMINIERA, L
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1993, 23 (01): : 31 - 54
  • [28] IP security protocols
    Bozoki, E
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 42 - +
  • [29] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [30] Verification of Security Protocols
    Cortier, Veronique
    [J]. VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13