References
- G. Lowe, 'Breaking and Fixing the Needham-Schroeder Public-Key Protocol,'TACAS 96, pp.147-166, 1996
- I. G. Kim and J. Y. Choi, 'Formal verification of PAP and EAP- MD5 Protocols in wireless networks : FDR Model Checking,' 18th AINA, pp.264-269, 2004 https://doi.org/10.1109/AINA.2004.1283800
- A. Roscoe and M. Goldsmith, 'The Perfect Spy for Model-Checking Cryptoprotocols,' Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997
- Z. Dang, 'Using the ASTRAL Model Checker for Cryptographic Protocol Analysis,' Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997
- T. Coffey and R. Dojen, 'Analysis of a mobile communication security protocol,' Proceeding of the 1st international symposium on Information and communication technologies, pp. 322-328, 2003
- C. A. R. Hoare, Communicating Sequential Processes, Prentice-Hall, 1985
- P. Y. A. Ryan and S. A. Schneider, modelling and analysis of security protocols: the CSP Approach, Addison-Wesley, 2001
- G. Lowe, 'Casper: A Compiler for the Analysis of Security Protocols,' 10th IEEE Computer Security Foundations Workshop, 1997 https://doi.org/10.1109/CSFW.1997.596779
- Formal Systems (Europe) Ltd. Failure Divergence Refinement-FDR2 User Manual. 1999
- M. Aydos, B. Sunar, and C. K. Koc, 'An elliptic curve cryptography based authentication and key agreement protocol for wireless communication,' presented at the 2nd Int. Workshop Discrete Algorithms and Methods for Mobility, Dallas, TX, Oct. 1998
- M. J. Beller, L. -F. Chang and Y. Yacobi, 'Privacy and authentication on a portable communications system,' Proceedings of the International Computer Symposium, Vol.1, pp.821-829, 1994
- A. Aziz and W. Diffie, 'Privacy and authentication for wireless local area networks,' IEEE Personal Commun., First Quarter 25 31, 1994 https://doi.org/10.1109/98.295357
- W. Stallings, NETWORK SECURITY ESSENTIALS : Applications and Standards, Second Edition, page 70, Prentice-Hall, 1999