Author:
Szymoniak Sabina,Siedlecka-Lamch Olga,Kurkowski Mirosław
Publisher
Springer International Publishing
Reference12 articles.
1. Armando, A., et. al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of 17th International Conference on Computer Aided Verification (CAV’05), vol. 3576 of LNCS, pp. 281–285, Springer, Berlin (2005)
2. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)
3. Cremers, C.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification, Princeton, USA, pp. 414–418 (2008)
4. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–207 (1983)
5. Jakubowska, G., Penczek, W.: Modeling and checking timed authentication security protocols. In: Proceedings of the International Workshop on Concurrency, Specification and Programming (CS&P’Z06), Informatik-Berichte 206(2), str. 280–291, Humboldt University (2006)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献