Citations
The paper
has been cited by the following works.
- C. Xu, G. Kedem, and
F. Gong.
Categorizing attacks on cryptographic protocols based on intruders.
In Proceedings of the FMCS'2000 Foundational Methods in Computer Science
Conference, June 2000.
- M. Marrotte.
BAN logic for zero-knowledge identification protocols.
In Florida State University CGS 5892 Network Security Conference,
2001.
- M. Panti, L. Spalazzi,
and S. Tacconi.
Attacks
on cryptographic protocols: A survey.
Technical Report TR-2002-10, University of Ancona, 2002.
- (Author
names in Chinese).
Analyzing the attacks
types on the cryptographic protocol.
Computer Engineering and Applications, 40(1):16–19, 2004.
In Chinese.
- J. Edmonds and
M. Papa.
Cryptographic protocol analysis using goal extraction.
In International Conference on Information Technology: Coding Computing,
ITCC, pages 75–80, 2004.
- J. Edmonds and
M. Papa.
Cryptographic protocol analysis using goal extraction.
In Proceedings of the ITCC'04 Information Technology: Coding and
Computing, pages 75–80, April 2004.
(doi:10.1109/ITCC.2004.1286429)
- Z. Jiliang,
L. Xianxian, and L. Jianxin.
A new taxonomy of attacks
on security protocols and their security evaluation.
Journal of Computer Research and Development, 42(7):1100–1107,
2005.
In Chinese.
- Y. Mo, Y. Zhang, and
X. Li.
Research on the design
principles of security protocol.
Computer Engineering, 31(24):181–185, 2005.
In Chinese.
- M.S. Kirkpatrick
and E. Bertino.
Enforcing spatial constraints for mobile RBAC systems.
In Proceedings of ACM Symposium on Access Control Models and
Technologies, SACMAT, pages 99–108, 2010.
(doi:10.1145/1809842.1809860)
- A. Pironti, D. Pozza,
and R. Sisto.
Automated formal methods for security protocol engineering.
Cyber Security Standards, Practices and Industrial Applications: Systems
and Methodologies, pages 138–166, 2011.
(doi:10.4018/978-1-60960-851-4.ch008)
- H. Wang, G. Tan, and
L. Liu.
Authentication protocol security assessment framework based on attack
classification.
Applied Mechanics and Materials, 143-144:859–863, 2012.
(doi:10.4028/www.scientific.net/AMM.143-144.859)
- M. Avalle, A. Pironti,
and R. Sisto.
Formal verification of security protocol implementations: A survey.
Formal Aspects of Computing, 26(1):99–123, 2014.
(doi:10.1007/s00165-012-0269-9)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.