Affiliation:
1. Department of Computer Science, University of Oxford, Oxford, UK. E-mails: thomas.gibson-robinson@cs.ox.ac.uk, gavin.lowe@cs.ox.ac.uk
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software
Reference23 articles.
1. Secure implementation of channel abstractions;Abadi;Information and Computation,2002
2. A framework for compositional verification of security protocols;Andova;Information and Computation,2008
3. [3]A. Armando, R. Carbone and L. Compagna, LTL model checking for security protocols, in: Computer Security Foundations Symposium, 2007, pp. 385–396.
4. [4]G. Bella, C. Longo and L.C. Paulson, Verifying second-level security protocols, in: Theorem Proving in Higher Order Logics, 2003, pp. 352–366.
5. [5]B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, in: Proceedings of the 14th IEEE Computer Security Foundations Workshop, 2001, pp. 82–96.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献