-
3
-
-
19344369103
-
Towards a mechanization of cryptographic protocol verification
-
LNCS 1254, Springer-Verlag
-
D. Bolignano, "Towards a mechanization of cryptographic protocol verification," in Proc. of CAV 97, LNCS 1254, Springer-Verlag, 1997.
-
(1997)
Proc. of CAV 97
-
-
Bolignano, D.1
-
4
-
-
0023544236
-
Introduction to the ISO specification language LOTOS
-
T. Bolognesi and E. Brinksma, "Introduction to the ISO specification language LOTOS," Computer Networks and ISDN Systems, Vol. 14, No. 1, pp. 25-59, 1987.
-
(1987)
Computer Networks and ISDN Systems
, vol.14
, Issue.1
, pp. 25-59
-
-
Bolognesi, T.1
Brinksma, E.2
-
5
-
-
0009353138
-
Safety for branching time semantics
-
Springer-Verlag, Berlin, July
-
A. Bouajjani, J.-C. Fernandez, S. Graf, C. Rodriguez, and J. Sifakis, "Safety for branching time semantics," in 18th ICALP, Springer-Verlag, Berlin, July 1991.
-
(1991)
18th ICALP
-
-
Bouajjani, A.1
Fernandez, J.-C.2
Graf, S.3
Rodriguez, C.4
Sifakis, J.5
-
6
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, Vol. 8, 1990.
-
(1990)
ACM Transactions on Computer Systems
, pp. 8
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
0020190170
-
On the security of ping-pong protocols
-
D. Dolev, S. Even, and R. Karp, "On the security of ping-pong protocols," Information and Control, Vol. 55, pp. 57-68, 1982.
-
(1982)
Information and Control
, vol.55
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.3
-
9
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev and A. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, Vol. 29, No. 2, pp. 198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
0003307585
-
Fundamentals of algebraic specification 1, equations and initial semantics
-
W. Brauer, B. Rozenberg, and A. Salomaa (Eds.), Springer Verlag
-
H. Ehrig and B. Mahr, "Fundamentals of algebraic specification 1, equations and initial semantics," in W. Brauer, B. Rozenberg, and A. Salomaa (Eds.), EATCS, Monographs on Theoretical Computer Science, Springer Verlag, 1985.
-
(1985)
EATCS, Monographs on Theoretical Computer Science
-
-
Ehrig, H.1
Mahr, B.2
-
11
-
-
0000063950
-
CADP (CÆSAR/ALDEBARAN development package): A protocol validation and verification toolbox
-
R. Alur and T. Henzinger (Eds.), New Brunswick, New Jersey, USA, Aug.
-
J.-C. Fernandez, H. Garavel, A. Kerbrat, R. Mateescu, L. Mounier, and M. Sighireanu, "CADP (CÆSAR/ALDEBARAN development package): A protocol validation and verification toolbox," in R. Alur and T. Henzinger (Eds.), in Proc. of the 8th Conference on Computer-Aided Verification, New Brunswick, New Jersey, USA, Aug. 1996.
-
(1996)
Proc. of the 8th Conference on Computer-Aided Verification
-
-
Fernandez, J.-C.1
Garavel, H.2
Kerbrat, A.3
Mateescu, R.4
Mounier, L.5
Sighireanu, M.6
-
12
-
-
1942526832
-
An overview of the eucalyptus toolbox
-
Maribor, Slovenia, June
-
H. Garavel, "An overview of the eucalyptus toolbox, in Proc. of the COST247 Workshop," Maribor, Slovenia, June 1996.
-
(1996)
Proc. of the COST247 Workshop
-
-
Garavel, H.1
-
13
-
-
0344655898
-
Model-based design and verification of security protocols using LOTOS
-
Rutgers University, NJ, USA, Sept.
-
F. Germeau and G. Leduc, "Model-based design and verification of security protocols using LOTOS," in Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, NJ, USA, Sept. 1997.
-
(1997)
Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Germeau, F.1
Leduc, G.2
-
14
-
-
0343286684
-
A computer-aided design of a secure registration protocol
-
Chapman & Hall, London
-
F. Germeau and G. Leduc, "A computer-aided design of a secure registration protocol," Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE/PSTV'97, Chapman & Hall, London, pp. 145-160, 1997.
-
(1997)
Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE/PSTV'97
, pp. 145-160
-
-
Germeau, F.1
Leduc, G.2
-
15
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
LNCS 330, Springer-Verlag
-
L. Guillou and J.-J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," in Proc. of Eurocrypt'88, LNCS 330, Springer-Verlag, pp. 123-128.
-
Proc. of Eurocrypt'88
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.-J.2
-
16
-
-
0343528810
-
OKAPI: A Kernel for access control to multimedia services based on trusted third parties
-
Louvain-la-Neuve, Belgium, May
-
J. Guimaraes, J.-M. Boucqueau, and B. Macq, "OKAPI: A Kernel for access control to multimedia services based on trusted third parties," in Proc. of ECMAST 96 - European Conference on Multimedia Applications, Services and Techniques, Louvain-la-Neuve, Belgium, pp. 783-798, May 1996.
-
(1996)
Proc. of ECMAST 96 - European Conference on Multimedia Applications, Services and Techniques
, pp. 783-798
-
-
Guimaraes, J.1
Boucqueau, J.-M.2
Macq, B.3
-
19
-
-
0024665744
-
Using formal methods to analyse encryption protocols
-
R. Kemmerer, "Using formal methods to analyse encryption protocols," IEEE Journal on Selected Areas in Communications, Vol. 7, No. 4, pp. 448-457, 1989.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.1
-
20
-
-
0343286683
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen, "Three systems for cryptographic protocol analysis," Journal of Cryptology, Vol. 7, No. 2, pp. 14-18, 1989.
-
(1989)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 14-18
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
21
-
-
0343092865
-
Providing equitable conditional access by use of trusted third parties
-
Louvain-la-Neuve, Belgium, May
-
S. Lacroix, J.-M. Boucqueau, J.-J. Quisquater, and B. Macq, "Providing equitable conditional access by use of trusted third parties," in Proc. of ECMAST 96 - European Conference on Multimedia Applications, Services and Techniques, Louvain-la-Neuve, Belgium, pp. 763-782, May 1996.
-
(1996)
Proc. of ECMAST 96 - European Conference on Multimedia Applications, Services and Techniques
, pp. 763-782
-
-
Lacroix, S.1
Boucqueau, J.-M.2
Quisquater, J.-J.3
Macq, B.4
-
22
-
-
0345518200
-
Specification and verification of a TTP protocol for the conditional access to services
-
Montreal, Canada, Oct.
-
G. Leduc, O. Bonaventure, E. Koerner, L. Léonard, C. Pecheur, and D. Zanetti, "Specification and verification of a TTP protocol for the conditional access to services," in Proc. of 12th J. Cartier Workshop on Formal Methods and their Applications: Telecommunications, VLSI and Real-Time Computerized Control System, Montreal, Canada, Oct. 1996.
-
(1996)
Proc. of 12th J. Cartier Workshop on Formal Methods and Their Applications: Telecommunications, VLSI and Real-Time Computerized Control System
-
-
Leduc, G.1
Bonaventure, O.2
Koerner, E.3
Léonard, L.4
Pecheur, C.5
Zanetti, D.6
-
23
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe, "An attack on the Needham-Schroeder public-key authentication protocol," Information Processing Letters, Vol. 56, pp. 131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
24
-
-
0003130993
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
T. Margaria and B. Steffen (Eds.), LNCS 1055, Springer-Verlag
-
G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," in T. Margaria and B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, LNCS 1055, Springer-Verlag, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems
-
-
Lowe, G.1
-
25
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows, "Applying formal methods to the analysis of a key management protocol," Journal of Computer Security, 1992.
-
(1992)
Journal of Computer Security
-
-
Meadows, C.1
-
26
-
-
0030084918
-
The NRL protocol analyser: An overview
-
C. Meadows, "The NRL protocol analyser: An overview," Journal of Logic Programming, Vol. 26, No. 8, pp. 113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.8
, pp. 113-131
-
-
Meadows, C.1
-
27
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
LNCS 917
-
C. Meadows, "Formal verification of cryptographic protocols: A survey," in Proc. of Asiacrypt 94, LNCS 917, pp. 133-150, 1995.
-
(1995)
Proc. of Asiacrypt 94
, pp. 133-150
-
-
Meadows, C.1
-
28
-
-
0023295108
-
The interrogator: Protocol security analysis
-
J. Millen, S. Clark, and S. Freedman, "The interrogator: Protocol security analysis," IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
-
-
Millen, J.1
Clark, S.2
Freedman, S.3
-
31
-
-
0017930809
-
On a method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman, "On a method for obtaining digital signatures and public key cryptosystems," Communication of the ACM, Vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Communication of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
32
-
-
0342417109
-
ELUDO: The University of Ottawa Toolkit
-
University of Ottawa, Obtainable by FTP
-
B. Stepien, J. Tourrilhes, and J. Sincennes, "ELUDO: The University of Ottawa Toolkit," Technical Report, University of Ottawa, 1994. Obtainable by FTP at lotos.csi.uottawa.ca.
-
(1994)
Technical Report
-
-
Stepien, B.1
Tourrilhes, J.2
Sincennes, J.3
-
33
-
-
0024936551
-
Use of formal technique in the specification of authentication protocols
-
V Varadharajan, "Use of formal technique in the specification of authentication protocols," Computer Standards and Interfaces, Vol. 9, pp. 203-215, 1989.
-
(1989)
Computer Standards and Interfaces
, vol.9
, pp. 203-215
-
-
Varadharajan, V.1
|