Historical Background and Further Reading

作者: Cas Cremers , Sjouke Mauw

DOI: 10.1007/978-3-540-78636-8_8

关键词: Horn clauseReading (process)Cover (telecommunications)Model checkingAuthentication protocolCryptographic protocolProgramming languageComputer science

摘要: We provide historical background on our approach, we give pointers for further reading and describe alternative approaches. only cover those approaches that are closely related to ours.

参考文章(136)
P. Brezillon, P. Bouquet, Lecture Notes in Artificial Intelligence ,(1999)
Shaddin F. Doghmi, Joshua D. Guttman, Javier Thayer, Skeletons and the Shapes of Bundles ,(2005)
Pierre Bieber, Nora Boulahia-Cuppens, Formal Development of Authentication Protocols 6th Refinement Workshop. pp. 80- 102 ,(1994) , 10.1007/978-1-4471-3240-0_5
Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse, None, Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions Computer Security – ESORICS 2012. ,vol. 7459, pp. 73- 90 ,(2012) , 10.1007/978-3-642-33167-1_5
Ferucio Laurentiu Tiplea, Constantin Enea, Catalin V. Birjoveanu, Decidability and Complexity Results for Security Protocols. VISSAS. pp. 185- 211 ,(2005)
Dieter Gollmann, On the Verification of Cryptographic Protocols: A Tale of Two Committees Electronic Notes in Theoretical Computer Science. ,vol. 32, pp. 42- 58 ,(2000) , 10.1016/S1571-0661(04)00094-5
D. Longley, S. Rigby, Refereed articles: An automatic search for security flaws in key management schemes Computers & Security. ,vol. 11, pp. 75- 89 ,(1992) , 10.1016/0167-4048(92)90222-D
Richard A. Kemmerer, Analyzing Encryption Protocols Using Formal Verification Techniques. theory and application of cryptographic techniques. pp. 48- ,(1986)
Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade, A survey of algebraic properties used in cryptographic protocols Journal of Computer Security. ,vol. 14, pp. 1- 43 ,(2006) , 10.3233/JCS-2006-14101