Author:
Zhang Zichao,de Amorim Arthur Azevedo,Jia Limin,Păsăreanu Corina
Publisher
Springer International Publishing
Reference57 articles.
1. Abadi, M., Blanchet, B., Fournet, C.: The applied pi calculus: mobile values, new names, and secure communication. CoRR abs/1609.03003 (2016). http://arxiv.org/abs/1609.03003
2. Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Trans. Softw. Eng. 22(1), 6–15 (1996). https://doi.org/10.1109/32.481513
3. Lecture Notes in Computer Science;R Alur,2005
4. Lecture Notes in Computer Science;R Anderson,1995
5. Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S.F., Radomirović, S.: A framework for compositional verification of security protocols. Inf. Comput. 206(2), 425–459 (2008). Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2006). https://doi.org/10.1016/j.ic.2007.07.002. http://www.sciencedirect.com/science/article/pii/S0890540107001228
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ProInspector: Uncovering Logical Bugs in Protocol Implementations;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08