-
1
-
-
84947418221
-
Towards a mechanization of cryptographic protocol verification
-
D. Bolignano Towards a mechanization of cryptographic protocol verification Computer Aided Verification. 9th International Conference 131 142 Computer Aided Verification. 9th International Conference 1997
-
(1997)
, pp. 131-142
-
-
Bolignano, D.1
-
2
-
-
85176666670
-
The Mur[illegible text] verification system
-
D. L. Dill The Mur[illegible text] verification system Computer Aided Verification. 8th International Conference 390 393 Computer Aided Verification. 8th International Conference 1996
-
(1996)
, pp. 390-393
-
-
Dill, D.L.1
-
3
-
-
0001771327
-
Formal specification of abstract memory models
-
D. L. Dill S. Park A. G. Nowatzyk Formal specification of abstract memory models Symposium on Research on Integrated Systems 38 52 Symposium on Research on Integrated Systems 1993
-
(1993)
, pp. 38-52
-
-
Dill, D.L.1
Park, S.2
Nowatzyk, A.G.3
-
5
-
-
85176677428
-
-
J. T. Kohl B. C. Neuman The Kerberos network authentication service (version 5) September 1993 Internet Request For Comments RFC-1510
-
(1993)
-
-
Kohl, J.T.1
Neuman, B.C.2
-
6
-
-
0003130993
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
G. Lowe Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems 1996
-
(1996)
-
-
Lowe, G.1
-
7
-
-
0030705405
-
Automated analysis of cryptographic protocols using Mur[illegible text]
-
J. C. Mitchell M. Mitchell U. Stern Automated analysis of cryptographic protocols using Mur[illegible text] IEEE Symposium on Security and Privacy 141 151 IEEE Symposium on Security and Privacy 1997
-
(1997)
, pp. 141-151
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
8
-
-
85024253955
-
Finite-state analysis of SSL 3.0
-
J. C. Mitchell V. Shmatikov U. Stern Finite-state analysis of SSL 3.0 7th USENIX Security Symposium 201 215 7th USENIX Security Symposium 1998
-
(1998)
, pp. 201-215
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
9
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham M. Schroeder Using encryption for authentication in large networks of computers Communications of the ACM 21 12 993 999 1978
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
10
-
-
84948129403
-
Automatic verification of the SCI cache coherence protocol
-
U. Stern D. L. Dill Automatic verification of the SCI cache coherence protocol Advanced Research Working Conference on Correct Hardware Design and Verification Methods 21 34 Advanced Research Working Conference on Correct Hardware Design and Verification Methods 1995
-
(1995)
, pp. 21-34
-
-
Stern, U.1
Dill, D.L.2
-
11
-
-
0029226478
-
System design methodology of UltraSPARC™-I
-
L. Yang D. Gao J. Mostoufi R. Joshi P. Loewenstein System design methodology of UltraSPARC™-I 32nd Design Automation Conference 7 12 32nd Design Automation Conference 1995
-
(1995)
, pp. 7-12
-
-
Yang, L.1
Gao, D.2
Mostoufi, J.3
Joshi, R.4
Loewenstein, P.5
|