Cryptographic Protocol Analysis on Real C Code
- 1 January 2005
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- A static analyzer for large safety-critical softwarePublished by Association for Computing Machinery (ACM) ,2003
- Security Properties: Two Agents Are SufficientPublished by Springer Nature ,2003
- Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded SoftwarePublished by Springer Nature ,2002
- On Name Generation and Set-Based Analysis in the Dolev-Yao ModelPublished by Springer Nature ,2002
- Normalizable Horn Clauses, Strongly Recognizable Relations, and SpiPublished by Springer Nature ,2002
- Pointer analysisPublished by Association for Computing Machinery (ACM) ,2001
- Ultra-fast aliasing analysis using CLAPublished by Association for Computing Machinery (ACM) ,2001
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978