Provable implementations of security protocols

被引:5
|
作者
Gordon, Andrew D.
机构
关键词
D O I
10.1109/LICS.2006.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:345 / 346
页数:2
相关论文
共 50 条
  • [1] Verified Interoperable Implementations of Security Protocols
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Tse, Stephen
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
  • [2] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
  • [3] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [4] Towards provable security for data transmission protocols in sensor network
    Department of Computer Science and Engineering, Shanghai University of Electric Power, Shanghai 200090, China
    不详
    J. Inf. Sci. Eng., 2009, 1 (319-333):
  • [5] Towards Provable Security for Data Transmission Protocols in Sensor Network
    Wen, Mi
    Dong, Ling
    Zheng, Yan-Fei
    Chen, Ke-Fei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (01) : 319 - 333
  • [6] Formally sound implementations of security protocols with Java']JavaSPI
    Sisto, Riccardo
    Copet, Piergiuseppe Bettassa
    Avalle, Matteo
    Pironti, Alfredo
    FORMAL ASPECTS OF COMPUTING, 2018, 30 (02) : 279 - 317
  • [7] AnBx: Automatic generation and verification of security protocols implementations
    School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom
    Lect. Notes Comput. Sci., (156-173):
  • [8] An analysis of conformance issues in implementations of standardized security protocols
    Izquierdo, Antonio
    Sierra, Jose M.
    Torres, Joaquin
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 246 - 251
  • [9] AnBx: Automatic Generation and Verification of Security Protocols Implementations
    Modesti, Paolo
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
  • [10] Verified reference implementations of WS-security protocols
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    WEB SERVICES AND FORMAL METHODS, PROCEEDINGS, 2006, 4184 : 88 - 106