Author:
Gürgens Sigrid,Pujol Gimena
Reference26 articles.
1. Barras B, Boutin S, Cornes C, Courant J, Filliatre J, Giménez E, Herbelin H, Huet G, noz CM, Murthy C, Parent C, Paulin C, Saïbi A, Werner B (1997) The Coq Proof Assistant Reference Manual – Version V6.1. Tech. Rep. 0203, INRIA
2. Bellare M, Canetti R, Krawczyk H (1998) A modular approach to the design and analysis of authentication and key exchange protocols. In: 30th Annual Symposium on the Theory of Computing, ACM
3. Bossi A, Focardi R, Piazza C, Rossi S (2004) Verifying Persistent Security Properties. Computer Languages, Systems and Structures 30:231–258
4. Boyd C (1993) Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communication 11(5)
5. Burrows M, Abadi M, Needham R (1990) A Logic of Authentication. ACM Transactions on Computer Systems 8