[图书][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life

R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

[图书][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

The inductive approach to verifying cryptographic protocols

LC Paulson - Journal of computer security, 1998 - content.iospress.com
Informal arguments that cryptographic protocols are secure can be made rigorous using
inductive definitions. The approach is based on ordinary predicate calculus and copes with …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

Maude-NPA: Cryptographic protocol analysis modulo equational properties

S Escobar, C Meadows, J Meseguer - International School on …, 2007 - Springer
In this tutorial, we give an overview of the Maude-NRL Protocol Analyzer (Maude-NPA), a
tool for the analysis of cryptographic protocols using functions that obey different equational …

Attacking and fixing Helios: An analysis of ballot secrecy

V Cortier, B Smyth - Journal of Computer Security, 2013 - content.iospress.com
Abstract Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting
system, suitable for use in low-coercion environments. In this article, we analyse ballot …

Inductive analysis of the internet protocol TLS

LC Paulson - ACM Transactions on Information and System Security …, 1999 - dl.acm.org
Internet browsers use security protocols to protect sensitive messages. An inductive analysis
of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle …