An intruder model for verifying liveness in security protocols

被引:0
|
作者
Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands [1 ]
不详 [2 ]
机构
关键词
D O I
10.1145/1180337.1180340
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Verifying security Protocols for sensor networks using algebraic specification techniques
    Ouranos, Iakovos
    Stefaneas, Petros
    ALGEBRAIC INFORMATICS, 2007, 4728 : 247 - +
  • [32] Verifying multicast-based security protocols using the inductive method
    Jean Everson Martina
    Lawrence Charles Paulson
    International Journal of Information Security, 2015, 14 : 187 - 204
  • [33] A Model Checking Method for Verifying the Fault Tolerance of Distributed Protocol Liveness Properties
    Lu C.-Y.
    Nie C.-H.
    Cheung S.C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (08): : 1714 - 1731
  • [34] Verifying multicast-based security protocols using the inductive method
    Martina, Jean Everson
    Paulson, Lawrence Charles
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 187 - 204
  • [35] A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols
    Li, Qin
    Zeng, Qingkai
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 232 - 239
  • [36] An abstraction and refinement framework for verifying security protocols based on logic programming
    Li, MengJun
    Zhou, Ti
    Li, ZhouJun
    Chen, HuoWang
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 166 - +
  • [37] Verifying Liveness by Multiple Experts in Face Biometrics
    Kollreider, K.
    Fronthaler, H.
    Bigun, J.
    2008 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, VOLS 1-3, 2008, : 1200 - 1205
  • [38] Verifying liveness properties of reactive systems (A tutorial)
    Pnueli, A
    HYBRID AND REAL-TIME SYSTEMS, 1997, 1201 : 1 - 1
  • [39] Anvil: Verifying Liveness of Cluster Management Controllers
    Sun, Xudong
    Ma, Wenjie
    Gu, Jiawei Tyler
    Ma, Zicheng
    Chajed, Tej
    Howell, Jon
    Lattuada, Andrea
    Padon, Oded
    Suresh, Lalith
    Szekeres, Adriana
    Xu, Tianyin
    PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 649 - 666
  • [40] Verifying Team Formation Protocols with Probabilistic Model Checking
    Chen, Taolue
    Kwiatkowska, Marta
    Parker, David
    Simaitis, Aistis
    COMPUTATIONAL LOGIC IN MULTI-AGENT SYSTEMS, 2011, 6814 : 190 - 207