12.07.2015 Views

Security Protocols II: Syntax and Operational Semantics (Part 1)

Security Protocols II: Syntax and Operational Semantics (Part 1)

Security Protocols II: Syntax and Operational Semantics (Part 1)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Roles <strong>Semantics</strong>Bibliography• Franz Baader <strong>and</strong> Tobias Nipkow. Term Rewriting <strong>and</strong> All That. CambridgeUniversity Press, 1998.• Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell,Andre Scedrov. A comparison between str<strong>and</strong> spaces <strong>and</strong> multiset rewritingfor security protocol analysis. Journal of Computer <strong>Security</strong> 13(2),IOS-Press, 2005.• Danny Dolev <strong>and</strong> Andrew C. Yao. On the <strong>Security</strong> of Public Key <strong>Protocols</strong>.IEEE Trans. Inf. Th., 1983.• Claude Kirchner, Hélène Kirchner. Rewriting, Solving, Proving. Apreliminary version of a book available athttp://www.loria.fr/˜ckirchne/=rsp/rsp.pdf, 1999.• Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. H<strong>and</strong>book ofApplied Cryptography. CRC Press, 1996.Available at http://www.cacr.math.uwaterloo.ca/hac• Sebastian Mödersheim. Algebraic Properties in Alice <strong>and</strong> Bob Notation.Proceedings of Ares’09. IEEE Computer Society, 2009.• Peter Ryan, Steve Schneider, Michael Goldsmith, Gawin Lowe, Bill Roscoe.Modelling <strong>and</strong> Analysis of <strong>Security</strong> <strong>Protocols</strong>. Addison-Wesley, 2000.Sebastian Mödersheim FMSEC Module 3, v.2 5.10.2009 37 of 36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!