An intruder model for verifying liveness in security protocols

被引:0
|
作者
Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands [1 ]
不详 [2 ]
机构
关键词
D O I
10.1145/1180337.1180340
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Verifying liveness properties of multifunction composite protocols
    Park, JC
    COMPUTER COMMUNICATIONS, 2003, 26 (12) : 1318 - 1329
  • [2] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [3] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [4] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [5] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
  • [6] Verifying the independence of security protocols
    Bela, Genge
    Ignat, Iosif
    ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
  • [7] Verifying security protocols by knowledge analysis
    School of Systems Engineering, The University of Reading, Reading, United Kingdom
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192
  • [8] Verifying Parameterized Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
  • [9] TAuth: Verifying Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
  • [10] Verifying security protocols: An application of CSP
    Schneider, S
    Delicata, R
    COMMUNICATING SEQUENTIAL PROCESSES: THE FIRST 25 YEARS, 2005, 3525 : 243 - 263