-
3
-
-
0346537830
-
Formally modeling and verifying Ricart&Agrawala distributed mutual exclusion algorithm
-
IEEE CS Press
-
Ogata, K., Futatsugi, K.: Formally modeling and verifying Ricart&Agrawala distributed mutual exclusion algorithm. In: APAQS '01, IEEE CS Press (2001) 357-366
-
(2001)
APAQS '01
, pp. 357-366
-
-
Ogata, K.1
Futatsugi, K.2
-
4
-
-
84891332068
-
Formal analysis of Suzuki&Kasami distributed mutual exclusion algorithm
-
Kluwer Academic Publishers
-
Ogata, K., Futatsugi, K.: Formal analysis of Suzuki&Kasami distributed mutual exclusion algorithm. In: FMOODS '02, Kluwer Academic Publishers (2002) 181-195
-
(2002)
FMOODS '02
, pp. 181-195
-
-
Ogata, K.1
Futatsugi, K.2
-
5
-
-
35248900007
-
Formal analysis of the iKP electronic payment protocols
-
ISSS 2002. Springer
-
Ogata, K., Futatsugi, K.: Formal analysis of the iKP electronic payment protocols. In: ISSS 2002. Volume 2609 of LNCS., Springer (2003) 441-460
-
(2003)
LNCS
, vol.2609
, pp. 441-460
-
-
Ogata, K.1
Futatsugi, K.2
-
6
-
-
0345906741
-
Formal verification of the Horn-Preneel micropayment protocol
-
VMCAI 2003. Springer
-
Ogata, K., Futatsugi, K.: Formal verification of the Horn-Preneel micropayment protocol. In: VMCAI 2003. Volume 2575 of LNCS., Springer (2003) 238-252
-
(2003)
LNCS
, vol.2575
, pp. 238-252
-
-
Ogata, K.1
Futatsugi, K.2
-
7
-
-
84855626013
-
-
CafeOBJ: CafeOBJ web page
-
CafeOBJ: CafeOBJ web page. http://www.ldl.jaist.ac.jp/cafeobj/ (2001)
-
-
-
-
10
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56 (1995) 131-133
-
(1995)
Inf. Process. Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
11
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
TACAS '96. Springer
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: TACAS '96. LNCS 1055, Springer (1996) 147-166
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
13
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Comm. ACM 21 (1978) 993-999
-
(1978)
Comm. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
14
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 (1983) 198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
16
-
-
0003503018
-
Isabelle/HOL - A Proof Assistant for Higer-Order Logic
-
Springer
-
Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle/HOL - A Proof Assistant for Higer-Order Logic. LNCS 2283. Springer (2002)
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
17
-
-
67649662693
-
Component-based algebraic specification and verification in CafeOBJ
-
World Congress on Formal Methods. Springer
-
Diaconescu, R., Futatsugi, K., Iida, S.: Component-based algebraic specification and verification in CafeOBJ. In: World Congress on Formal Methods. Volume 1709 of LNCS., Springer (1999) 1644-1663
-
(1999)
LNCS
, vol.1709
, pp. 1644-1663
-
-
Diaconescu, R.1
Futatsugi, K.2
Iida, S.3
-
19
-
-
19044393469
-
Rewriting-based verification of authentication protocols
-
WRLA '02. Elsevier Science Publishers
-
Ogata, K., Futatsugi, K.: Rewriting-based verification of authentication protocols. In: WRLA '02. Volume 71 of ENTCS., Elsevier Science Publishers (2002)
-
(2002)
ENTCS
, vol.71
-
-
Ogata, K.1
Futatsugi, K.2
|