Author:
Yan Jingchen,Wagatsuma Kazunori,Gao Hongbiao,Cheng Jingde
Reference18 articles.
1. Avalle, M., Alfredo, P., Riccardo, S.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99 (2014)
2. Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18–25 (2011)
3. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE, (2001)
4. Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.96: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2016)
5. Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: International Conference on the Theory and Application of Cryptology. Springer, Heidelberg (1994)