An intruder model for verifying liveness in security protocols

被引:0
|
作者
Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands [1 ]
不详 [2 ]
机构
关键词
D O I
10.1145/1180337.1180340
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Abstraction by Set-Membership Verifying Security Protocols and Web Services with Databases
    Modersheim, Sebastian A.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 351 - 360
  • [42] SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
    Xiong, Yan
    Su, Cheng
    Huang, Wenchao
    Miao, Fuyou
    Wang, Wansen
    Ouyang, Hengyi
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 253 - 270
  • [43] Verifying mobile ad-hoc security routing protocols with type inference
    Li, Qin
    Zeng, Qing-Kai
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2822 - 2833
  • [44] USING Z TO MODEL AND ANALYZE SAFETY AND LIVENESS PROPERTIES OF COMMUNICATION PROTOCOLS
    HAUGHTON, HP
    INFORMATION AND SOFTWARE TECHNOLOGY, 1991, 33 (08) : 575 - 580
  • [45] A method for verifying deadlock freedom and liveness of Petri nets
    Jiao, Li
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 209 - 211
  • [46] Verifying Safety and Liveness for the FlexTM Hybrid Transactional Memory
    Abdulla, Parosh
    Dwarkadas, Sandhya
    Rezine, Ahmed
    Shriraman, Arrvindh
    Zhu, Yunyun
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 785 - 790
  • [47] VERIFYING SECURITY
    CHEHEYL, MH
    GASSER, M
    HUFF, GA
    MILLEN, JK
    COMPUTING SURVEYS, 1981, 13 (03) : 279 - 339
  • [48] Verifying mutual exclusion and liveness properties with split preconditions
    Singh, AK
    Bandyopadhyay, AK
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 795 - 802
  • [49] Verifying mutual exclusion and liveness properties with split preconditions
    Awadhesh Kumar Singh
    Anup Kumar Bandyopadhyay
    Journal of Computer Science and Technology, 2004, 19 : 795 - 802
  • [50] VERIFYING THE SUMMIT BUS CONVERTER PROTOCOLS WITH SYMBOLIC MODEL CHECKING
    HARKNESS, C
    WOLF, E
    FORMAL METHODS IN SYSTEM DESIGN, 1994, 4 (02) : 83 - 97