ProVerif
出典: フリー百科事典『ウィキペディア(Wikipedia)』 (2022/02/22 09:49 UTC 版)
ProVerifは、暗号化プロトコルの安全性要件に関する自動推論を行うソフトウェアツールであり、ブルーノ ブランシェットによって開発された。
- ^ https://discuss.ocaml.org/t/new-release-proverif-2-03/8463
- ^ Abadi, Martín; Blanchet, Bruno (2005). “Computer-assisted verification of a protocol for certified email”. Science of Computer Programming 58 (1–2): 3–27. doi:10.1016/j.scico.2005.02.002.
- ^ Abadi, Martín; Glew, Neal (2002). Certified Email with a Light On-line Trusted Third Party: Design and Implementation. WWW '02. New York, NY, USA: ACM. 387–395. doi:10.1145/511446.511497. ISBN 978-1581134490
- ^ Abadi, Martín; Blanchet, Bruno; Fournet, Cédric (July 2007). “Just Fast Keying in the Pi Calculus”. ACM Transactions on Information and System Security 10 (3): 9–es. doi:10.1145/1266977.1266978. ISSN 1094-9224.
- ^ Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer (May 2004). “Just Fast Keying: Key Agreement in a Hostile Interne”. ACM Transactions on Information and System Security 7 (2): 242–273. doi:10.1145/996943.996946. ISSN 1094-9224.
- ^ Blanchet, B.; Chaudhuri, A. (May 2008). Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. 417–431. doi:10.1109/SP.2008.12. ISBN 978-0-7695-3168-7
- ^ Kallahalla, Mahesh; Riedel, Erik; Swaminathan, Ram; Wang, Qian; Fu, Kevin (2003). “Plutus: Scalable Secure File Sharing on Untrusted Storage”. Proceedings of the 2Nd USENIX Conference on File and Storage Technologies: 29–42 .
- ^ Bhargavan, Karthikeyan; Fournet, Cédric; Gordon, Andrew D. (2006-09-08) (英語). Verified Reference Implementations of WS-Security Protocols. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 88–106. doi:10.1007/11841197_6. ISBN 9783540388623
- ^ Bhargavan, Karthikeyan; Fournet, Cédric; Gordon, Andrew D.; Swamy, Nikhil (2008). Verified Implementations of the Information Card Federated Identity-management Protocol. ASIACCS '08. New York, NY, USA: ACM. 123–135. doi:10.1145/1368310.1368330. ISBN 9781595939791
- ^ Bhargavan, Karthikeyan; Fournet, Cédric; Gordon, Andrew D.; Tse, Stephen (December 2008). “Verified Interoperable Implementations of Security Protocols”. ACM Transactions on Programming Languages and Systems 31 (1): 5:1–5:61. doi:10.1145/1452044.1452049. ISSN 0164-0925.
- ^ Chen, Liqun; Ryan, Mark (2009-11-05) (英語). Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 201–216. doi:10.1007/978-3-642-12459-4_15. ISBN 9783642124587
- ^ Delaune, Stéphanie; Kremer, Steve; Ryan, Mark (2009-01-01). “Verifying privacy-type properties of electronic voting protocols” (英語). Journal of Computer Security 17 (4): 435–487. doi:10.3233/jcs-2009-0340. ISSN 0926-227X.
- ^ Kremer, Steve; Ryan, Mark (2005-04-04) (英語). Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 186–200. doi:10.1007/978-3-540-31987-0_14. ISBN 9783540254355
- ^ Backes, M.; Hritcu, C.; Maffei, M. (June 2008). Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. 195–209. doi:10.1109/CSF.2008.26. ISBN 978-0-7695-3182-3
- ^ Delaune, Stéphanie; Ryan, Mark; Smyth, Ben (2008-06-18) (英語). Automatic Verification of Privacy Properties in the Applied pi Calculus. IFIP – The International Federation for Information Processing. Springer, Boston, MA. 263–278. doi:10.1007/978-0-387-09428-1_17. ISBN 9780387094274
- ^ Backes, M.; Maffei, M.; Unruh, D. (May 2008). Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. 202–215. doi:10.1109/SP.2008.23. ISBN 978-0-7695-3168-7
- ^ Küsters, R.; Truderung, T. (July 2009). Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. 157–171. doi:10.1109/CSF.2009.17. ISBN 978-0-7695-3712-2
- ^ Küsters, Ralf; Truderung, Tomasz (2011-04-01). “Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach” (英語). Journal of Automated Reasoning 46 (3–4): 325–352. arXiv:0808.0634. doi:10.1007/s10817-010-9188-8. ISSN 0168-7433.
- ^ Kremer, Steve; Ryan, Mark; Smyth, Ben (2010-09-20) (英語). Election Verifiability in Electronic Voting Protocols. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 389–404. doi:10.1007/978-3-642-15497-3_24. ISBN 9783642154966
- ^ “Application Layer Transport Security | Documentation” (英語). Google Cloud. 2019年11月21日閲覧。
- ^ Sardar, Muhammad Usama; Quoc, Do Le; Fetzer, Christof (August 2020). “Towards Formalization of Enhanced Privacy ID (EPID)-based Remote Attestation in Intel SGX”. 2020 23rd Euromicro Conference on Digital System Design (DSD) (Kranj, Slovenia: IEEE): 604–607. doi:10.1109/DSD51259.2020.00099. ISBN 978-1-7281-9535-3 .
- ^ Sardar, Muhammad Usama; Faqeh, Rasha; Fetzer, Christof (2020). Lin, Shang-Wei; Hou, Zhe; Mahony, Brendan. eds. “Formal Foundations for Intel SGX Data Center Attestation Primitives” (英語). Formal Methods and Software Engineering (Cham: Springer International Publishing) 12531: 268–283. doi:10.1007/978-3-030-63406-3_16. ISBN 978-3-030-63406-3 .
- 1 ProVerifとは
- 2 ProVerifの概要
- 3 参考文献
Weblioに収録されているすべての辞書からProVerifを検索する場合は、下記のリンクをクリックしてください。
全ての辞書からProVerif を検索
- ProVerifのページへのリンク