Next: About this document
Up: AGVI- Automatic GenerationVerification,
Previous: Experiments
References
- CJ97
-
J. Clark and J. Jacob.
A survey of authentication protocol literature.
http://www.cs.york.ac.uk/~jac/papers/drareview.ps.gz, 1997.
Version 1.0.
- CJM98
-
E.M. Clarke, S. Jha, and W. Marrero.
Using state space exploration and a natural deduction style message
derivation engine to verify security protocols.
In In Proceedings of the IFIP Working Conference on Programming
Concepts and Methods (PROCOMET), 1998.
- Int93
-
International Standards Organization.
Information Technology - Security techniques -- Entity
Authentication Mechanisms Part 3: Entity authentication using symmetric
techniques, 1993.
ISO/IEC 9798.
- Mea94
-
C. Meadows.
The NRL protocol analyzer: An overview.
In Proceedings of the Second International Conference on the
Practical Applications of Prolog, 1994.
- Mil95
-
J. Millen.
The Interrogator model.
In Proceedings of the 1995 IEEE Symposium on Security and
Privacy, pages 251-260, 1995.
- MMS97
-
J. C. Mitchell, M. Mitchell, and U. Stern.
Automated analysis of cryptographic protocols using mur.
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy. IEEE Computer Society Press, 1997.
- PPS00
-
Adrian Perrig, Doantam Phan, and Dawn Xiaodong Song.
ACG-automatic code generation. automatic implementation of a
security protocol.
Technical Report 00-1120, UC Berkeley, December 2000.
- PS00a
-
Adrian Perrig and Dawn Song.
A first step towards the automatic generation of security protocols.
In Network and Distributed System Security Symposium, February
2000.
- PS00b
-
Adrian Perrig and Dawn Xiaodong Song.
Looking for diamonds in the dessert: Automatic security protocol
generation for three-party authentication and key distribution.
In Proc. of IEEE Computer Security Foundations Workshop CSFW
13, July 2000.
- SBP00
-
Dawn Song, Sergey Berezin, and Adrian Perrig.
Athena, a new efficient automatic checker for security protocols.
Submitted to Journal of Computer Security, 2000.
- Son99
-
Dawn Song.
Athena: An automatic checker for security protocol analysis.
In Proceedings of the 12th Computer Science Foundation
Workshop, 1999.
- THG98
-
F.Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman.
Strand spaces: Why is a security protocol correct?
In Proceedings of 1998 IEEE Symposium on Security and Privacy,
1998.
Next: About this document
Up: AGVI- Automatic GenerationVerification,
Previous: Experiments
Adrian Perrig
Mon Jun 4 22:31:29 PDT 2001