next up previous
Next: About this document Up: AGVI- Automatic GenerationVerification, Previous: Experiments

Full paper: Postscript, PS.GZ, PDF


References

CJ97
J. Clark and J. Jacob. A survey of authentication protocol literature. http://www.cs.york.ac.uk/~jac/papers/drareview.ps.gz, 1997. Version 1.0.

CJM98
E.M. Clarke, S. Jha, and W. Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In In Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET), 1998.

Int93
International Standards Organization. Information Technology - Security techniques -- Entity Authentication Mechanisms Part 3: Entity authentication using symmetric techniques, 1993. ISO/IEC 9798.

Mea94
C. Meadows. The NRL protocol analyzer: An overview. In Proceedings of the Second International Conference on the Practical Applications of Prolog, 1994.

Mil95
J. Millen. The Interrogator model. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 251-260, 1995.

MMS97
J. C. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using murϕ. In Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1997.

PPS00
Adrian Perrig, Doantam Phan, and Dawn Xiaodong Song. ACG-automatic code generation. automatic implementation of a security protocol. Technical Report 00-1120, UC Berkeley, December 2000.

PS00a
Adrian Perrig and Dawn Song. A first step towards the automatic generation of security protocols. In Network and Distributed System Security Symposium, February 2000.

PS00b
Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the dessert: Automatic security protocol generation for three-party authentication and key distribution. In Proc. of IEEE Computer Security Foundations Workshop CSFW 13, July 2000.

SBP00
Dawn Song, Sergey Berezin, and Adrian Perrig. Athena, a new efficient automatic checker for security protocols. Submitted to Journal of Computer Security, 2000.

Son99
Dawn Song. Athena: An automatic checker for security protocol analysis. In Proceedings of the 12th Computer Science Foundation Workshop, 1999.

THG98
F.Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998.


next up previous
Next: About this document Up: AGVI- Automatic GenerationVerification, Previous: Experiments

Adrian Perrig
Mon Jun 4 22:31:29 PDT 2001