-
1
-
-
85031620050
-
A semantics for a logic of authentication
-
Montreal, Canada, August
-
Martin Abadi and Mark R. Tuttle, "A Semantics for a Logic of Authentication", Tenth Annual ACM Symp on Princ of Dist Computing, Montreal, Canada, August, 1991
-
(1991)
Tenth Annual ACM Symp on Princ of Dist Computing
-
-
Abadi, M.1
Tuttle, M.R.2
-
2
-
-
0004019982
-
A practical study in belief and action
-
(Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif.
-
Burrows, M., Abadi, M., and Needham, R. M. "A Practical Study in Belief and Action", In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif., 1988, pp. 325-342
-
(1988)
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge
, pp. 325-342
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
3
-
-
84961760201
-
Automatically detecting most vulnerabilities in cryptographic protocols
-
January
-
S. Brackin, "Automatically Detecting Most Vulnerabilities in Cryptographic Protocols", in The DARPA Information Survivability Conference and Exposition, January 2000, Vol.1, pp 222-36
-
(2000)
The DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 222-236
-
-
Brackin, S.1
-
4
-
-
0004135984
-
-
Technical Report TR-96-050, Purdue University, COAST Laboratory, Sept.
-
Crosbie, M.; Dole, B.; Ellis, T.; Krsul, I.; Spafford, E, "IDIOT - Users Guide", Technical Report TR-96-050, Purdue University, COAST Laboratory, Sept. 1996
-
(1996)
IDIOT - Users Guide
-
-
Crosbie, M.1
Dole, B.2
Ellis, T.3
Krsul, I.4
Spafford, E.5
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
Aug.
-
D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, vol. 24, no. 8, Aug 1981, pp. 533-536
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
7
-
-
0006025721
-
Identification of host audit data to detect attacks on low-level IP
-
Daniels and Spafford, "Identification of Host Audit Data to Detect Attacks on Low-level IP", Journal of Computer Security, Volume 7, Issue 1, 1999
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Daniels1
Spafford2
-
8
-
-
0020720357
-
On the security of public key protocols
-
(Mar.). Also Stan-CS-81-854, May 1981, Stanford U.
-
Dolev, D., and Yao, A.C. "On the security of public key protocols". IEEE Trans. Inf. Theory IT-29, 2(Mar. 1983), pp. 198-208. Also Stan-CS-81-854, May 1981, Stanford U.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
9
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Proc. of Crypto∼'86 (Lecture Notes in Computer Science 263), Editor A. Odlyzko, Springer-Verlag, Santa Barbara, California, U. S. A., August 11-15
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems", Advances in Cryptology, Proc. of Crypto∼'86 (Lecture Notes in Computer Science 263), Editor A. Odlyzko, Springer-Verlag, pp. 186-194, Santa Barbara, California, U. S. A., August 11-15, 1987
-
(1987)
Advances in Cryptology
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
10
-
-
0002019134
-
An intrusion detection system based upon autonomous mobile agents
-
Aug: Vienna
-
Gregory, D.; Shi, Q.; Merabti, M., 'An Intrusion Detection System Based upon Autonomous Mobile Agents", pp. 586-591, 14th International conference on Information security, 1998 Aug: Vienna
-
(1998)
14th International Conference on Information Security
, pp. 586-591
-
-
Gregory, D.1
Shi, Q.2
Merabti, M.3
-
11
-
-
84962306569
-
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
-
Jan 25-27
-
Y. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang, "Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure", DARPA Information Survivability Conference and Exposition 2000, Jan 25-27, 2000, Vol. 2, pp 69-83
-
(2000)
DARPA Information Survivability Conference and Exposition 2000
, vol.2
, pp. 69-83
-
-
Jou, Y.1
Gong, F.2
Sargor, C.3
Wu, X.4
Wu, S.5
Chang, H.6
Wang, F.7
-
12
-
-
0024665744
-
Using formal methods to analyze encryption protocols
-
May
-
R. A. Kemmerer, "Using Formal Methods to Analyze Encryption Protocols," IEEE Journal on Selected Areas in Communications, vol. 7, mo. 4, pp. 448-457, May 1989
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.A.1
-
13
-
-
85068233104
-
On belief evolution in authentication protocols
-
IEEE Computer Society Press, Los Alamitos, CA
-
Rajeshekar Kailar and Virgil D. Gligor, "On Belief Evolution in Authentication Protocols", In Proceedings of the Computer Security Foundations Workshop IV, PP 103-16, IEEE Computer Society Press, Los Alamitos, CA, 1991
-
(1991)
Proceedings of the Computer Security Foundations Workshop IV
, pp. 103-116
-
-
Kailar, R.1
Gligor, V.D.2
-
15
-
-
84956985093
-
Protocol interactions and the chosen protocol attack
-
Proceedings, Springer-Verlag
-
J. Kelsey, B. Schneier, and D. Wagner, "Protocol Interactions and the Chosen Protocol Attack", Security Protocols, 5th, International Workshop April 1997, Proceedings, Springer-Verlag, 1998, pp.91-104
-
(1998)
Security Protocols, 5th, International Workshop April 1997
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
16
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen, ""Three Systems for Cryptographic Protocol Analysis", The Journal of Cryptology, Vol. 7, no. 2, 1993
-
(1993)
The Journal of Cryptology
, vol.7
, Issue.2
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
18
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Jan 25-27
-
R.P. Lippman, D.J. Fried, I.Graf, J.W. Haines, K.R. Kendall, D. McCllung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation", DARPA Information Survivability Conference and Exposition 2000, Jan 25-27, 2000, Vol. 2, pp 12-26
-
(2000)
DARPA Information Survivability Conference and Exposition 2000
, vol.2
, pp. 12-26
-
-
Lippman, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McCllung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
19
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
Gavin Lowe, "An Attack on the Needham-Schroeder Public Key Authentication Protocol", Information Processing Letters, 56:131-133, 1995
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public key protocol using FDR
-
Proceedings of TACAS, Springer-Verlag
-
Gavin Lowe, "Breaking and Fixing the Needham-Schroeder Public Key Protocol Using FDR", In Proceedings of TACAS, Vol. 1055 of Lecture Notes in Computer Science, pp 147-166, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Gavin Lowe, "Casper: A Compiler for the Analysis of Security Protocols", Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997. Also in Journal of Computer Security, Volume 6, pages 53-84, 1998.
-
(1997)
Proceedings of 10th IEEE Computer Security Foundations Workshop
-
-
Lowe, G.1
-
22
-
-
84882791488
-
-
Gavin Lowe, "Casper: A Compiler for the Analysis of Security Protocols", Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997. Also in Journal of Computer Security, Volume 6, pages 53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
-
23
-
-
0023295108
-
The interrogator: Protocol security analysis
-
Feb.
-
Millen, J.K., Clark, S. C., and Freedman, S. B. "The interrogator: Protocol security analysis". IEEE Trans. Sofw. eng. SB-13, 2(Feb. 1987), pp. 274-288
-
(1987)
IEEE Trans. Sofw. Eng.
, vol.SB-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
24
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
LNSC 917, Springer-Verlag
-
Catherine Meadows, "Formal Verification of Cryptographic Protocols: A Survey," Advances in Cryptology - Asiacrypt '94, LNSC 917, Springer-Verlag, 1995, pp. 133-150
-
(1995)
Advances in Cryptology - Asiacrypt '94
, pp. 133-150
-
-
Meadows, C.1
-
26
-
-
0032664157
-
A formal framework and evaluation method for network denial of service
-
Jun 28-30, Mordano, Italy
-
Catherine Meadows, "A Formal Framework and Evaluation Method for Network Denial of Service", 12th IEEE Computer Security Foundations Workshop, Jun 28-30, 1999, Mordano, Italy
-
(1999)
12th IEEE Computer Security Foundations Workshop
-
-
Meadows, C.1
-
27
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
Roger M. Needham, Michael D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, December 1978 vol. 21 #12, pp. 993-999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
28
-
-
0032665338
-
Security issues related to mobile code and agent-based systems
-
July
-
R. Oppliger. Security issues related to mobile code and agent-based systems, pp. 1165-1170. Computer Communications, Vol. 22, No. 12 (July 1999):
-
(1999)
Computer Communications
, vol.22
, Issue.12
, pp. 1165-1170
-
-
Oppliger, R.1
-
31
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Jun 28-30, 99, Mordano, Italy
-
Dawn Xiaodong Song, "Athena: A New Efficient Automatic Checker for Security Protocol Analysis", 12th IEEE Computer Security Foundations Workshop, Jun 28-30, 99, Mordano, Italy
-
12th IEEE Computer Security Foundations Workshop
-
-
Song, D.X.1
-
36
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
Vigna and Kemmerer, "NetSTAT: A Network-based Intrusion Detection System", Journal of Computer Security, Volume 7, Issue 1, 1999
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna1
Kemmerer2
-
39
-
-
0004289370
-
-
University of Virginia Technical Report, CS-93-66, December 22
-
Yasinsac, Alec; Wulf, William A, "Evaluating Cryptographic Protocols", University of Virginia Technical Report, CS-93-66, December 22, 1993
-
(1993)
Evaluating Cryptographic Protocols
-
-
Yasinsac, A.1
Wulf, W.A.2
|