Formally-Based Black-Box Monitoring of Security Protocols
- 1 January 2010
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Security protocols, properties, and their monitoringPublished by Association for Computing Machinery (ACM) ,2008
- An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation2007 IEEE Symposium on Computers and Communications, 2007
- Verified Interoperable Implementations of Security ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Automated Security Protocol Analysis With the AVISPA ToolElectronic Notes in Theoretical Computer Science, 2006
- Implementing a Formally Verifiable Security Protocol in Java CardPublished by Springer Nature ,2004
- Secure Implementation of Channel AbstractionsInformation and Computation, 2002
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- Security properties and CSPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1996
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983