Intensional specifications of security protocols

被引:36
|
作者
Roscoe, AW [1 ]
机构
[1] UNIV OXFORD,COMP LAB,OXFORD OX1 3QD,ENGLAND
关键词
D O I
10.1109/CSFW.1996.503688
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:28 / 38
页数:11
相关论文
共 50 条
  • [31] Analysing security protocols
    Gollmann, D
    [J]. FORMAL ASPECTS OF SECURITY, 2003, 2629 : 71 - 80
  • [32] Incentives in Security Protocols
    Azouvi, Sarah
    Hicks, Alexander
    Murdoch, Steven J.
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 132 - 141
  • [33] Internet security protocols
    Fumy, W
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 186 - 208
  • [34] Security protocols and their properties
    Abadi, M
    [J]. FOUNDATIONS OF SECURE COMPUTATION, 2000, 175 : 39 - 60
  • [35] Security protocols and performance
    deCarmo, L
    [J]. DR DOBBS JOURNAL, 2000, 25 (11): : 40 - +
  • [36] Multichannel security protocols
    Wong, Ford Long
    Stajano, Rank
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 31 - 39
  • [37] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [38] ON THE SECURITY OF RECENT PROTOCOLS
    CLARK, J
    JACOB, J
    [J]. INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 151 - 155
  • [39] Refining security protocols
    Sprenger, Christoph
    Basin, David
    [J]. JOURNAL OF COMPUTER SECURITY, 2018, 26 (01) : 71 - 120
  • [40] INTENSIONAL CONTEXTS AND INTENSIONAL ENTITIES
    KRAEMER, ER
    [J]. PHILOSOPHICAL STUDIES, 1980, 37 (01) : 65 - 66