Author:
Backes Michael,Cervesato Iliano,Jaggard Aaron D.,Scedrov Andre,Tsay Joe-Kai
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference61 articles.
1. The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of the Computer-aided Verification (CAV). Springer, 2005. http://www.avispa-project.org (2005)
2. Abadi, M., Jürjens, J.: Formal eavesdropping and its computational interpretation. In: Proceedings of TACS, pp. 82–94 (2001)
3. Abadi, M., Rogaway, P.: Reconciling two views of cryptography: The computational soundness of formal encryption. In: Proceedings of the 1st IFIP International Conference on Theoretical Computer Science, LNCS, vol. 1872, pp. 3–22. Springer (2000)
4. Backes, M.: A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In: Proceedings of ESORICS, LNCS, vol. 3193, pp. 89–108. Springer (2004)
5. Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.-K.: Cryptographically sound security proofs for basic and public-key Kerberos. In: Proceedings of ESORICS, pp. 362–383 (2006)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献