共 20 条
- [1] Bella G., Massacci F., Paulson L., An overview of the verification of SET, International Journal of In formation Security, 4, 1-2, pp. 17-28, (2005)
- [2] Bolignano D., An approach to the formal verification of cryptographic protocols, Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 106-118, (1996)
- [3] Burrows M., Abadi M., Needham R., A logic of authentication, ACM Transactions on Computer Systems, 8, 1, pp. 18-36, (1990)
- [4] Chen Q., The Verification Logic for Secure Transaction Protocols, (2004)
- [5] Chen Q., Zhang C., Zhang S., A logical framework ENDL for verifying secure transaction protocols, Knowledge and Information Systems, 7, 1, pp. 84-109, (2005)
- [6] Cheng X., Ma X., Cheng M., Huang S.C.-H., Proving secure properties of cryptographic protocols, Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), pp. 3-9, (2005)
- [7] Kim I., Choi J., Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking, Proceedings of the 18th International Conference on Advanced Information Networking and Applications, pp. 264-269, (2004)
- [8] Liebl A., Authentication in distributed systems: A bibliography, ACM SIGOPS Operating Systems Review, 27, 4, pp. 122-136, (1993)
- [9] Lowe G., An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, 56, 3, pp. 131-133, (1995)
- [10] Lowe G., Breaking and fixing the Needham-Schroeder public-key protocol using FDR, Lecture Notes in Computer Science, 1055, pp. 147-166, (1996)