Citation: | LIU Yi-wen, LI Wei-qin. Hierarchy Requirements and Verification for Cryptographic Protocols[J]. Journal of Beijing University of Aeronautics and Astronautics, 2002, 28(5): 589-592. (in Chinese) |
[1] Roscoe A W. Intensional specifications of security protocols . In:Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop . Los Alamitos:IEEE Computer Society, 1996. 28~38. [2]Boyd C. Towards extensional goals in authentication protocols .http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997. [3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2):85~128. [4]Abadi M, Tuttle M R. A semantics for logic of authentication . In:Proceedings of the 10th ACM Symposium on Principles of Distributed Computing . New York:ACM Press, 1991. 201~216. [5]Meadows C. A model of computation for the NRL protocol analyzer . In:Gong L, ed. Proceedings of Computer Security Foundations Workshop VII .Los Alamitos:IEEE Computer Society Press, 1994. 84~89. [6]Syverson P F. Adding time to a logic of authentication . In:Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security . New York:ACM Press, 1993. 97~101.
|