Author:
Gao Han,Nielson Flemming,Nielson Hanne Riis
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148(1), 1–70 (1999)
2. Armando, A., Carbone, T., Compagna, L.: LTL model checking for security protocols. In: Proc. 20th CSFW (2007)
3. Armando, A., Carbone, T., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based sign on for Google appa. In: Proc. 6th ACM Workshop on Formal Methods in Security Engineering (2008)
4. Bella, G., Longo, C., Paulson, L.: Verifying second-level security protocols. In: Theorem Proving in Higher Order Logics (2003)
5. Broadfoot, P., Lowe, G.: On distributed security transactions that use secure transfport protocols. In: Proc. 16th CSFW (2003)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献