Author:
Bella Giampaolo,Massacci Fabio,Paulson Lawrence C.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference44 articles.
1. Abadi M, Blanchet B (2003) Computer-assisted verification of a protocol for certified email. In: Cousot R (ed) Proc. 10th international symposium on static analysis (SAS’03), Lecture notes in computer science, vol 2694. Springer, Berlin Heidelberg New York, pp 316–335
2. Anderson R (1994) Why cryptosystems fail. Commun ACM 37(11):32–40
3. Armando A, Basin D, Bouallagui M, Chevalier Y, Compagna L, Mödersheim S, Rusinowitch M, Turuani M, Viganò L, Vigneron L (2002) The AVISS Security Protocol Analysis Tool. In: Proc. international conference on computer-aided verification (CAV-02). Lecture notes in computer science, vol 2404. Springer, Berlin Heidelberg New York
4. Armando A, Compagna L, Ganty P (2003) SAT-based model-checking of security protocols. In: Proc. 12th international FME symposium (FME03), Pisa, Italy, 8–14 September 2003
5. Asokan N, Schunter M, Waidner M (1997) Optimistic protocols for fair exchange. In: Proc. 4th ACM conference on computer and communication security (CCS-97). ACM Press/Addison-Wesley, Reading, MA, pp 7–17
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献