CAPSL and MuCAPSL

作者: G. Denker , J.K. Millen

DOI:

关键词:

摘要:

参考文章(30)
Catherine A. Meadows, A System for the Specification and Verification of Key Management Protocols. ieee symposium on security and privacy. pp. 182- 197 ,(1991)
Laurence C. Paulson, ML for the working programmer ,(1991)
S. Owre, J. M. Rushby, N. Shankar, D. W. J. Stringer-Calvert, PVS: An Experience Report formal methods. pp. 338- 345 ,(1998) , 10.1007/3-540-48257-1_24
E. M. Clarke, S. Jha, W. Marrero, Using state space exploration and a natural deduction style message derivation engine to verify security protocols ifip international conference on programming concepts and methods. pp. 87- 106 ,(1998) , 10.1007/978-0-387-35358-6_10
Lawrence C. Paulson, ML for the working programmer (2nd ed.) Cambridge University Press. ,(1996)
G. Denker, J.K. Millen, A. Grau, J. Kuster Filipe, Optimizing protocol rewrite rules of CIL specifications ieee computer security foundations symposium. pp. 52- 62 ,(2000) , 10.1109/CSFW.2000.856925
U. Carlsen, Generating formal cryptographic protocol specifications ieee symposium on security and privacy. pp. 137- 146 ,(1994) , 10.1109/RISP.1994.296586
G. Denker, J. Millen, CAPSL integrated protocol environment darpa information survivability conference and exposition. ,vol. 1, pp. 207- 221 ,(2000) , 10.1109/DISCEX.2000.824980
R.A. Kemmerer, Analyzing encryption protocols using formal verification techniques IEEE Journal on Selected Areas in Communications. ,vol. 7, pp. 448- 457 ,(1989) , 10.1109/49.17707
M. Baugher, B. Weis, T. Hardjono, H. Harney, The Group Domain of Interpretation The Group Domain of Interpretation. ,vol. 3547, pp. 1- 48 ,(2003)