An intruder model for verifying liveness in security protocols

被引:0
|
作者
Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands [1 ]
不详 [2 ]
机构
关键词
D O I
10.1145/1180337.1180340
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [11] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
  • [12] An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
    Armando, Alessandro
    Compagna, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 91 - 108
  • [13] The Simplified Inductive Approach to Verifying Security Protocols
    Wang Juan
    Zhou Yajie
    Mang Huanguo
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
  • [14] A Z based approach to verifying security protocols
    Long, BW
    Fidge, CJ
    Cerone, A
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
  • [15] Verifying second-level security protocols
    Bella, G
    Longo, C
    Paulson, LC
    THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
  • [16] Verifying security Protocols modelled by networks of automata
    Kurkowski, Miroslaw
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 453 - 471
  • [17] Advancing the Automation Capability of Verifying Security Protocols
    Wang, Wansen
    Huang, Wenchao
    Meng, Zhaoyi
    Xiong, Yan
    Su, Cheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5059 - 5070
  • [18] VERIFYING LIVENESS PROPERTIES BY VERIFYING SAFETY PROPERTIES
    BURCH, JR
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 531 : 224 - 232
  • [19] Verifying liveness by augmented abstraction
    Kesten, Y
    Pnueli, A
    COMPUTER SCIENCE LOGIC, PROCEEDINGS, 1999, 1683 : 141 - 156
  • [20] Verifying Liveness for Asynchronous Programs
    Ganty, Pierre
    Majumdar, Rupak
    Rybalchenko, Andrey
    ACM SIGPLAN NOTICES, 2009, 44 (01) : 102 - 113