共 7 条
- [1] Ji Q.G., Feng D.G., Towards analyzing some kinds of critically formal models for network security protocols, Chinese Journal of Computers, 28, 7, pp. 1071-1083, (2005)
- [2] Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A., A meta-notation for protocol analysis, Proc. of the 12th IEEE Computer Security Foundations Workshop-CSFW'99, pp. 55-69, (1999)
- [3] Cervesato I., A specification language for crypto-protocols based on multiset rewriting, dependent types and subsorting, Proc. of the Workshop on Specification, Analysis and Validation for Emerging Technologies-SAVE'01, pp. 1-22, (2001)
- [4] Cervesato I., Data access specification and the most powerful symbolic attacker in MSR, Software Security, Theories and Systems, pp. 384-416, (2003)
- [5] Lowe G., A hierarchy of authentication specifications, Proc. of the 10th IEEE Computer Security Foundations Workshop, pp. 31-43, (1997)
- [6] Cervesato I., Typed MSR: Syntax and examples, Proc. of the 1st Int'l Workshop on Mathematical Methods, Models and Architectures for Computer Network Security-MMM 2001, pp. 159-176, (2001)
- [7] Butler F., Cervesato I., Jaggard A., Scedrov A., A formal analysis of some properties of Kerberos 5 using MSR, (2004)