Citations
The paper
has been cited by the following works.
- C. Xu, G. Kedem, and
  F. Gong.
Categorizing attacks on cryptographic protocols based on intruders.
In Proceedings of the FMCS'2000 Foundational Methods in Computer Science
  Conference, June 2000.
- M. Marrotte.
BAN logic for zero-knowledge identification protocols.
In Florida State University CGS 5892 Network Security Conference,
  2001.
- M. Panti, L. Spalazzi,
  and S. Tacconi.
Attacks
  on cryptographic protocols: A survey.
Technical Report TR-2002-10, University of Ancona, 2002.
- (Author
  names in Chinese).
Analyzing the attacks
  types on the cryptographic protocol.
Computer Engineering and Applications, 40(1):16–19, 2004.
In Chinese.
- J. Edmonds and
  M. Papa.
Cryptographic protocol analysis using goal extraction.
In International Conference on Information Technology: Coding Computing,
  ITCC, pages 75–80, 2004.
- J. Edmonds and
  M. Papa.
Cryptographic protocol analysis using goal extraction.
In Proceedings of the ITCC'04 Information Technology: Coding and
  Computing, pages 75–80, April 2004.
(doi:10.1109/ITCC.2004.1286429)
- Z. Jiliang,
  L. Xianxian, and L. Jianxin.
A new taxonomy of attacks
  on security protocols and their security evaluation.
Journal of Computer Research and Development, 42(7):1100–1107,
  2005.
In Chinese.
- Y. Mo, Y. Zhang, and
  X. Li.
Research on the design
  principles of security protocol.
Computer Engineering, 31(24):181–185, 2005.
In Chinese.
- M.S. Kirkpatrick
  and E. Bertino.
Enforcing spatial constraints for mobile RBAC systems.
In Proceedings of ACM Symposium on Access Control Models and
  Technologies, SACMAT, pages 99–108, 2010.
(doi:10.1145/1809842.1809860)
- A. Pironti, D. Pozza,
  and R. Sisto.
Automated formal methods for security protocol engineering.
Cyber Security Standards, Practices and Industrial Applications: Systems
  and Methodologies, pages 138–166, 2011.
(doi:10.4018/978-1-60960-851-4.ch008)
- H. Wang, G. Tan, and
  L. Liu.
Authentication protocol security assessment framework based on attack
  classification.
Applied Mechanics and Materials, 143-144:859–863, 2012.
(doi:10.4028/www.scientific.net/AMM.143-144.859)
- M. Avalle, A. Pironti,
  and R. Sisto.
Formal verification of security protocol implementations: A survey.
Formal Aspects of Computing, 26(1):99–123, 2014.
(doi:10.1007/s00165-012-0269-9)
Home
 Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.