Towards Developing Formal Verification Tools for Cryptographic Protocols
![]() |
권태경
(세종대학교 소프트웨어 공학과)
김승주 (한국정보보호진흥원) 송보연 (한국정보보호진흥원) |
1 |
A semantics for a logic of authentication
/
|
2 |
A critique of the Burrows Abadi and Needham logic
/
DOI |
3 |
A logic of composition for information flow predicates
/
|
4 |
Extending cryptographic ligics of belief to key agreement protocols
/
|
5 |
Entity authentication and key distribution
/
|
6 |
On the security oj public key protocols
/
DOI |
7 |
Strand spaces : Why is a security protocol correct?
/
|
8 |
Formal verification of cryptography protocols : A survey
/
|
9 |
/
|
10 |
Formal methods for the analysis of authentication protocols
/
|
11 |
/
|
12 |
Analysis of the Internet Key Exchange protocol using NRL Protocol Analyzer
/
|
13 |
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
/
|
14 |
A calculus for crytopraphic protocols : The Spicalculus
/
|
15 |
A HOL extension of GNY for automatically analyzing cryptographic protocols
/
|
16 |
Analyzing encryption protocols using formal verification technique
/
DOI ScienceOn |
17 |
Honest ideals on strand spaces
/
|
18 |
Athena:a novel approach to efficient automatic security protocol analysis
/
DOI |
19 |
Evaluating and improving protocol analysis by automatic proof
/
|
20 |
On a limitation of BAN logic
/
|
21 |
A modular approach to the design and analysis of authentication and key exchange protocols
/
|
22 |
The Interrogator : Protocol security analysis
/
DOI ScienceOn |
23 |
Key agreement protocols and their security analysis
/
|
24 |
Automated analysis of cryptographic protocols using Mur
/
|
25 |
Applying formal methods to the analysis of a key management protocol
/
DOI |
26 |
A system for the specification and analysis of key management protocols
/
|
27 |
A logic of communication in a hostile environment
/
|
28 |
Formal semantics for logics of cryptographic protocols
/
|
29 |
Formal method in the disign fo cryptographic protocols
/
|
30 |
A CAPSL interface for the NRL Protocol Analyzer
/
|
31 |
On unifying some cryptographic protocol logics
/
|
32 |
On the automation of GNY logic
/
|
33 |
On Formal Models for Sucure Key Exchange
/
|
34 |
Use of a formal description technique in the specification of authentication protocols
/
|
35 |
Reasoning about belief in cryptographic protocols
/
|
36 |
A logic of authentication
/
|
37 |
An interface specification language for automatically analyzing cryptographic protocol
/
|
38 |
C3PO: a tool for automatic sound cryptographic protocol analysis
/
|
39 |
New directions on Information theory
/
DOI |
40 |
Verification of network security protocols
/
DOI ScienceOn |
41 |
Modelling and verifying key-exchange protocols using CSP & FDR
/
|
![]() |