[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

[图书][B] The B language and method: a guide to practical formal development

K Lano - 2012 - books.google.com
B is one of the few formal methods which has robust, commercially-available tool support for
the entire development lifecycle from specification through to code generation. This volume …

[图书][B] Specification in B: An introduction using the B toolkit

H Haughton, K Lano - 1996 - books.google.com
This book gives a practical introduction to the B specification language and method, an
approach to the development of high-quality software using rigorous CASE techniques. It is …

[PDF][PDF] An approach to the formal verification of cryptographic protocols

D Bolignano - Proceedings of the 3rd ACM Conference on Computer …, 1996 - dl.acm.org
We present an approach to the verification of authentication protocols. The approach is
based on the use of general purpose formal methods. It is complementary with modal logic …

Towards the formal verification of electronic commerce protocols

D Bolignano - Proceedings 10th Computer Security …, 1997 - ieeexplore.ieee.org
Generalizes the approach defined by the author in Proc. 3rd ACM Conf. on Comput. &
Commun. Security (1996) so as to be able to formally verify electronic payment protocols …

[PDF][PDF] A taxonomy of attacks on secure devices

A Rae, L Wildman - Australia Information Warfare and Security …, 2003 - pure.york.ac.uk
Evaluating the security of hardware devices requires an organised assessment of which
attacks the device might be exposed to. This in turn requires a structured body of knowledge …

Refining security protocols

C Sprenger, D Basin - Journal of Computer Security, 2018 - content.iospress.com
We propose a development method for security protocols based on stepwise refinement.
Our refinement strategy transforms abstract security goals into protocols that are secure …

Developing security protocols by refinement

C Sprenger, D Basin - Proceedings of the 17th ACM conference on …, 2010 - dl.acm.org
We propose a development method for security protocols based on stepwise refinement.
Our refinement strategy guides the transformation of abstract security goals into protocols …

Refining key establishment

C Sprenger, D Basin - 2012 IEEE 25th Computer Security …, 2012 - ieeexplore.ieee.org
We use refinement to systematically develop a family of key establishment protocols using a
theorem prover. Our development spans four levels of abstraction: abstract security …