Author:
McCarthy Jay,Krishnamurthi Shriram
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Abadi, M.: Security protocols and their properties. In: Foundations of Secure Computation (2000)
2. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1–70 (1999)
3. Armando, A., Basin, D.A., Bouallagui, M., Chevalier, Y., Compagna, L., Mödersheim, S., Rusinowitch, M., Turuani, M., Viganò, L., Vigneron, L.: The AVISS security protocol analysis tool. In: Computer Aided Verification (2002)
4. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Automatic validation of protocol narration. In: Computer Security Foundations Workshop (2003)
5. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Journal of Computer Security 13(3), 347–390 (2005)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Forge: A Tool and Language for Teaching Formal Methods;Proceedings of the ACM on Programming Languages;2024-04-29
2. HasChor: Functional Choreographic Programming for All (Functional Pearl);Proceedings of the ACM on Programming Languages;2023-08-30
3. Alice and Bob Meet Equational Theories;Lecture Notes in Computer Science;2015
4. On Global Types and Multi-Party Session;Logical Methods in Computer Science;2012-03-15