Wei Wang, Dongyao Ji. Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. In Kenji Suzuki, Teruo Higashino, Keiichi Yasumoto, Khaled El-Fakih, editors, Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings. Volume 5048 of Lecture Notes in Computer Science, pages 305-323, Springer, 2008. [doi]
@inproceedings{WangJ08, title = {Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol}, author = {Wei Wang and Dongyao Ji}, year = {2008}, doi = {10.1007/978-3-540-68855-6_20}, url = {http://dx.doi.org/10.1007/978-3-540-68855-6_20}, tags = {protocol}, researchr = {https://researchr.org/publication/WangJ08}, cites = {0}, citedby = {0}, pages = {305-323}, booktitle = {Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings}, editor = {Kenji Suzuki and Teruo Higashino and Keiichi Yasumoto and Khaled El-Fakih}, volume = {5048}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-68854-9}, }