Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2010_12_a30, author = {M. I. Tsoy}, title = {Using {Scyther} for analysis {SKID3} security}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {65--66}, publisher = {mathdoc}, number = {12}, year = {2010}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/} }
M. I. Tsoy. Using Scyther for analysis SKID3 security. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 65-66. http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/
[1] Cheremushkin A. V., “Avtomatizirovannye sredstva analiza protokolov”, Prikladnaya diskretnaya matematika, 2009, Prilozhenie No 1, 34–36
[2] Dolev D., Yao A. C., “On the security of public key protocols”, IEEE Trans. Inform. Theory, 29:12 (1983), 198–208 | DOI | MR | Zbl
[3] Cremers C. J. F., Scyther – Semantics and Verification of Security Protocols, Ph. D. dissertation, Eindhoven University of Technology, 2006
[4] Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in $C$, 2nd ed., Wiley, 1995 | Zbl
[5] Klark E. M., Gramberg O., Peled D., Verifikatsiya modelei programm: Model Checking, per. s angl., ed. R. Smelyanskii, MTsNMO, M., 2002, 416 pp.