手机版

Verifying Secrecy by Abstract Interpretation(4)

时间:2025-04-27   来源:未知    
字号:

Verifying Secrecy by Abstract Interpretation

Bozga,Lakhnech,P´e rin

[19]R.M.Needham and ing encryption for authentication in large networks of computers.

CACM,21(12):993–999,1978.

[20]L.Paulson.Proving properties of security protocols by induction.In10th IEEE Computer Security

Foundations Workshop(CSFW’97),pages70–83,June1997.IEEE.

[21]M.Rusinowitch and M.Turuani.Protocol insecurity withfinite number of sessions is np-complete.In

14th IEEE Computer Security Foundations Workshop(2001),pp.174–190.,2001.

[22]S.Schneider.Verifying authentication protocols with CSP.In10th IEEE Computer Security Foundations

Workshop(CSFW’97),pages3–17,June1997.IEEE.

118

Verifying Secrecy by Abstract Interpretation(4).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
×
二维码
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)