Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols |
권태경
(세종대학교 컴퓨터공학부)
임선간 (한국정보보호진흥원) 박해룡 (한국정보보호진흥원) |
1 |
On unifying some cryptographic protocol logics
/
|
2 |
A semantics for a logic of authentication
/
|
3 |
Reasoning about belief in cryptographic protocols
/
|
4 |
Automation considered Logic of Authentication and key distribution
/
|
5 |
A unified cryptographic protocol logic
/
|
6 |
Timestamps in key distribution protocols
/
DOI |
7 |
A logic of authentication
/
|
8 |
The logic of authentication protocols
/
|
9 |
Isabelle/HOL
/
|
10 |
/
|
11 |
C3PO: a tool for automatic sound cryptographic protocol analysis
/
|
12 |
암호프로토콜 논리성 자동 검증에 관한 연구
/
과학기술학회마을 |
13 |
Using encryption for authentication in large networks of computers
/
DOI ScienceOn |
14 |
Extending cryptographic logics of belief to key agreement protocols
/
|
15 |
Some new attacks upon security protocols
/
|
16 |
Breaking and fixing the Needham-Schroeder public-ey protocol using FDR
/
|
17 |
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
/
|