FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS (original) (raw)

Approaches to Formal Verification of Security Protocols

Mohit Jain

Computing Research Repository, 2011

View PDFchevron_right

A new method of verification of security protocols

Andrew Mironov

Cornell University - arXiv, 2017

View PDFchevron_right

Formal verification of security protocol implementations: a survey

Ajeje Brazorf

View PDFchevron_right

Security protocols from the software verification perspective

Aleksy Schubert

mimuw.edu.pl

View PDFchevron_right

Formal automatic verification of authentication cryptographic protocols

Nadia Tawbi

Proceedings First IEEE International Conference on Formal Engineering Methods, 1997

View PDFchevron_right

Proving Security Protocols Correct

Lawrence Paulson

1999

View PDFchevron_right

Formal Methods for Assuring Security of Protocols

Shiu-Kai Chin

The Computer Journal, 2002

View PDFchevron_right

Cryptographic Protocols Specification and Verification Tools - a Survey

ANANTKUMAR UMBARKAR

ICTACT Journal on Communication Technology, 2017

View PDFchevron_right

Automated Logic-Based Technique for Formal Verification of Security Protocols

Anca Delia Jurcut

Journal of Advances in Computer Networks, 2018

View PDFchevron_right

Static validation of security protocols

Abadi Nrl

Journal of Computer Security, 2005

View PDFchevron_right

A formal methodology for integral security design and verification of network protocols

David Arroyo

2012

View PDFchevron_right

Generic Verification of Security Protocols

Sahid Khan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Formal verification logic for hybrid security protocols

Thomas Newe

Computer Systems: Science & Engineering, 2003

View PDFchevron_right

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification

Diomidis Spinellis

1999

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey Soporte Formal para el Desarrollo de Protocolos de Seguridad: una Visión General

Raul Monroy

2008

View PDFchevron_right

Verification with AVISPA to Engineer Network Security Protocols

Abubaker sadiq

2012

View PDFchevron_right

Verification of security protocols using LOTOS-method and application

Guy Leduc

Computer Communications, 2000

View PDFchevron_right

A Methodology for Protocol Verification

Leo Freitas

2018

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey

Raúl Monroy

Computación y Sistemas, 2008

View PDFchevron_right

Security Protocols: Specification, Verification, Implementation, and Composition

Omar Almousa

2016

View PDFchevron_right

Survey of Network Protocol Verification Techniques

Veena Bharti

2012

View PDFchevron_right

Proving secure properties of cryptographic protocols with knowledge based approach

maggie cheng

2005

View PDFchevron_right

A Comparative study of Security Protocols Validation Tools: HERMES vs. AVISPA

nala Zaied

View PDFchevron_right

Stateful Security Protocol Verification

Jun Pang

View PDFchevron_right

Model Checking for Security Protocols

W. Marrero

View PDFchevron_right

New Method of Verifying Cryptographic Protocols, Based on the Process Model

Andrew Mironov

Artificial Intelligence in Intelligent Systems, 2021

View PDFchevron_right

Formal Methods in Information Security

Ajayi Adebowale

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2015

View PDFchevron_right