ACM Transactions on Computer Systems (TOCS)
Using CSP to Detect Errors in the TMN Protocol
IEEE Transactions on Software Engineering
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
Towards a completeness result for model checking of security protocols
Journal of Computer Security
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
The running-mode analysis of two-party optimistic fair exchange protocols
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Common program analysis of two-party security protocols using SMV
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Hi-index | 0.00 |
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analyze the Davis Swick protocol and successfully prove the security this protocol. Therefore, we can draw a conclusion that Running-Mode Analysis of three-principal cryptographic protocol is available.