[1] |
GUTTMAN J D . Establishing and preserving protocol security goals[J]. Journal of Computer Security, 2014,22(2): 203-267.
|
[2] |
ARMANDO A , CARBONE R , COMPAGNA L . SATMC:a SAT-based model checker for security protocols,business processes,and security APIs[J]. International Journal on Software Tools for Technology Transfer, 2016,18(2): 187-204.
|
[3] |
CREMERS C , MANW S . Operational semantics and verification of security protocols[M]. Springer-Verlag Berlin Heidelberg, 2012: 78-103.
|
[4] |
CREMERS C , LAFOURCADE P , NADEAU P . Comparing state spaces in automatic security protocol analysis[M]. Formal to Practical Security. Springer Berlin Heidelberg, 2009: 70-94.
|
[5] |
DAIVD B , SEBASTIAN M , LUCA V . OFMC:a symbolic model checker for security protocols[J]. International Journal of Information Security, 2005,4(3): 181-208.
|
[6] |
ARMANDO A , CARBONE R , COMPAGNA L . SATMC:a SAT-based model checker for security protocols,business processes,and security APIs[J]. International Journal on Software Tools for Technology Transfer, 2016,18(2): 187-204.
|
[7] |
LUCA V . Automated security protocol analysis with the AVISPA tool[J]. Electronic Notes in Theoretical Computer Science, 2006,155: 61-86.
|
[8] |
CHEVAL V , CORTIER V . Timing attacks in security protocols:symbolic framework and proof techniques[M]// Principles of Security and Trust,Springer Berlin Heidelberg, 2015: 280-299.
|
[9] |
STYLIANOS B , PANAGIOTIS K , ANDREW P . An intruder model with message inspection for model checking security protocols[J]. Computers & Security, 2010,29(1): 16-34.
|
[10] |
BLANCHET B . Automatic verification of security protocols in the symbolic model:the verifier proverif[M]. Foundations of Security Analysis and Design VII. Springer International Publishing,2014, 8604: 54-87.
|
[11] |
PINAZO S S . Advanced features in protocol verification:theory,properties,and efficiency in maude-NPA[J]. Escobar Román Santiago, 2015.
|
[12] |
CHOTHIA T , SMYTH B , STAITE C . Automatically checking commitment protocols in ProVerif without false attacks[C]// International Conference on Principles of Security and Trust.Springer Berlin Heidelberg. 2015: 137-155.
|
[13] |
SIMON M . Advanced automatic security protocol verification[D]. ETH ZURICH, 2013: 99-116.
|
[14] |
MEIER S , SCHMIDT B , CREMERS C . The TAMRIN prover for the symbolic analysis of security protocols[C]// The 25th International Conference on Computer Aided Verification (CAV'13). 2013: 696-701.
|
[15] |
BASIN D , CREMERS C . Modeling and analyzing security in the presence of compromising adversaries[C]// The 15th European Conference on Research in Computer Security,Dimitris Gritzalis,2010, 6345: 340-356.
|