Information Technology Reference
In-Depth Information
4. Kindred, D. and Wing, J.M.: Fast, automatic checking of security protocols. In
Second USENIX Workshop on Electronic Commerce , Oakland, California (1996)
41-52
5. Lowe, G.: Breaking and fixing the Needham Schroeder public-key protocol using
FDR. In Proceedings of Tools and Algorithms for the Construction and the Analisys
of Systems , volume 1055 of Lecture Notes in Computer Science . Springer Verlag
(1996) 147-166
6. Marchignoli, D. and Martinelli, F.: Automatic verification of cryptographic proto-
cols through compositional analysis techniques. In Proceedings of the International
Conference on Tools and Algorithms for the Construction and the Analysis of Sys-
tems (TACAS'99) , volume 1579 of Lecture Notes in Computer Science (1999)
7. Martinelli, F.: Encoding several authentication properties as properties of the in-
truder's knowledge. Tech. Rep. IAT-B4-2001-20. Submitted for publication
8. Martinelli, F.: Symbolic semantics and analysis for crypto-ccs with (almost) generic
inference systems. In Proceedings of the 27th international Symposium in Mathe-
matical Foundations of Computer Sciences(MFCS'02) , volume 2420 of LNCS , 519-
531
9. Martinelli, F.: Formal Methods for the Analysis of Open Systems with Applications
to Security Properties . PhD thesis, University of Siena (Dec. 1998)
10. Martinelli, F.: Languages for description and analysis of authentication protocols.
In Proceedings of 6th ICTCS . World Scientific, (1998) 304-315
11. Martinelli, F.: Analysis of security protocols as open systems. Theoretical Computer
Science , 290(1), (2003) 1057-1106
12. Martinelli, F., Petrocchi, M., and Vaccarelli, A.: PaMoChSA: A tool for verification
of security protocols based on partial model checking. Tool Demo at the 1st Inter-
national School on Formal Methods for the Design of Computer, Communication
and Software Systems: Process Algebras. (2001)
13. Milner, R.: Communication and Concurrency . International Series in Computer
Science. Prentice Hall (1989)
14. Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., and Roscoe, B.: The Modelling
and Analysis of Security Protocols: the CSP Approach . Addison-Wesley (2000)
15. Schneider, S.: Verifying authentication protocols with CSP. In Proceedings of The
10th Computer Security Foundations Workshop . IEEE Computer Society Press
(1997)
16. Stirling, C.: Modal and temporal logics for processes. In Logics for Concurrency:
Structures versus Automata , volume 1043 of Lecture Notes in Computer Science
(1996) 149-237
 
Search WWH ::




Custom Search