共 73 条
[1]
Abadi M., Blanchet B., Secrecy types for asymmetric communication, Theoretical Computer Science, 298, 3, pp. 387-415, (2003)
[2]
Abadi M., Blanchet B., Analyzing security protocols with secrecy types and logic programs, Journal of the ACM, 52, 1, pp. 102-146, (2005)
[3]
Abadi M., Blanchet B., Computer-assisted verification of a protocol for certified email, Science of Computer Programming, 58, 1-2, pp. 3-27, (2005)
[4]
Abadi M., Blanchet B., Fournet C., Just Fast Keying in the pi calculus, ACM TISSEC, 10, 3, pp. 1-59, (2007)
[5]
Abadi M., Fournet C., Mobile values, new names, and secure communication, pp. 104-115, (2001)
[6]
Abadi M., Glew N., Horne B., Pinkas B., Certified email with a light on-line trusted third party: Design and implementation, 11Th Internationalworldwide Web Conference, pp. 387-395, (2002)
[7]
Abadi M., Needham R., Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, 22, 1, pp. 6-15, (1996)
[8]
Aiello W., Bellovin S.M., Blaze M., Canetti R., Ioannidis J., Keromytis K., Reingold O., Just Fast Keying: Key agreement in a hostile Internet, ACM TISSEC, 7, 2, pp. 242-273, (2004)
[9]
Aizatulin M., Gordon A.D., Jurjens J., Extracting and verifying cryptographic models from C protocol code by symbolic execution, CCS 2011, pp. 331-340, (2011)
[10]
Allamigeon X., Blanchet B., Reconstruction of attacks against cryptographic protocols, CSFW 2005, pp. 140-154, (2005)