共 57 条
[11]
Refinement Types for Secure Implementations
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2011, 33 (02)
[12]
Bhargavan K., 2012, ACM T INFORM SYST SE, V15, P1
[14]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[15]
A computationally sound mechanized prover for security protocols
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:140-154
[16]
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[17]
Brumley B., 2011, CT RSA
[18]
Brumley D, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P1
[19]
Canvel B, 2003, LECT NOTES COMPUT SC, V2729, P583
[20]
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
[J].
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM,
2009,
:172-185