-
1
-
-
0003206115
-
Introducing dynamic constraints in B
-
[AbM98] In D. Bert, editor April
-
[AbM98] Abrial, J.-R. and Mussat, L.: Introducing dynamic constraints in B. In D. Bert, editor, Second International B Conference, April 1998.
-
(1998)
Second International B Conference
-
-
Abrial, J.-R.1
Mussat, L.2
-
5
-
-
0012005941
-
Abstract machines for communication security
-
BBL93
-
[BBL93] Bieber, P., Boulahia-Cuppens, N., Lehmann, T. and van Wickeren, E.: Abstract machines for communication security. In 6th IEEE Computer Security Foundations Workshop, 1993.
-
(1993)
6th IEEE Computer Security Foundations Workshop
-
-
Bieber, P.1
Boulahia-Cuppens, N.2
Lehmann, T.3
Van Wickeren, E.4
-
6
-
-
0025386404
-
A logic of authentication
-
BAN90
-
[BAN90] Burrows, M., Abadi, M. and Needham, R.: A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0003681017
-
-
[But92] D.Phil. thesis, Programming Research Group, Oxford University
-
[But92] Butler, M.J.: A CSP Approach To Action Systems. D.Phil. thesis, Programming Research Group, Oxford University, 1992.
-
(1992)
A CSP Approach To Action Systems
-
-
Butler, M.J.1
-
8
-
-
0030245996
-
Stepwise refinement of communicating systems
-
[But96] September
-
[But96] Butler, M.J.: Stepwise refinement of communicating systems. Science of Computer Programming, 27(2):139-173, September 1996.
-
(1996)
Science of Computer Programming
, vol.27
, Issue.2
, pp. 139-173
-
-
Butler, M.J.1
-
10
-
-
0011584271
-
csp2B: A practical approach to combining CSP and B
-
But00
-
[But00] Butler, M.J.: csp2B: a practical approach to combining CSP and B. Formal Aspects of Computing, 12:182-198, 2000.
-
(2000)
Formal Aspects of Computing
, vol.12
, pp. 182-198
-
-
Butler, M.J.1
-
16
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Low95
-
[Low95] Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
17
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Low96
-
[Low96] Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software Concepts and Tools, 17:93-102, 1996.
-
(1996)
Software Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
18
-
-
0032684740
-
I/O automaton models and proofs for shared-key communications systems
-
Lyn99
-
[Lyn99] Lynch, N.: I/O automaton models and proofs for shared-key communications systems. In 12th IEEE Computer Security Foundations Workshop, 1999.
-
(1999)
12th IEEE Computer Security Foundations Workshop
-
-
Lynch, N.1
-
19
-
-
29144474589
-
The probabilistic steam boiler: A case study in probabilistic data refinement
-
[MMT98] Springer
-
[MMT98] McIver, A.K., Morgan, C.C. and Troubitsyna, E.: The probabilistic steam boiler: a case study in probabilistic data refinement. In International Refinement Workshop & Formal Methods Pacific '98, pages 250-265. Springer, 1998.
-
(1998)
International Refinement Workshop & Formal Methods Pacific '98
, pp. 250-265
-
-
McIver, A.K.1
Morgan, C.C.2
Troubitsyna, E.3
-
21
-
-
0023295108
-
The interrogator: Protocol security analysis
-
[MCF87] February
-
[MCF87] Millen, J.K., Clark, S.C. and Freeman, S.B.: The Interrogator: protocol security analysis. IEEE Transactions on Software Engineering, SE-13(2):274-288, February 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freeman, S.B.3
-
22
-
-
10644277404
-
Of wp and CSP
-
[Mor90] In W.H.J. Feijen, A.J.M. van Gasteren, D. Gries and J. Misra, editors, Springer
-
[Mor90] Morgan, C.C.: Of wp and CSP. In W.H.J. Feijen, A.J.M. van Gasteren, D. Gries and J. Misra, editors, Beauty is our Business: A Birthday Salute to Edsger W. Dijkstra. Springer, 1990.
-
(1990)
Beauty is our Business: A Birthday Salute to Edsger W. Dijkstra
-
-
Morgan, C.C.1
-
23
-
-
0030143516
-
Probabilistic predicate transformers
-
MMS96
-
[MMS96] Morgan, C.C., McIver, A.K. and Seidel, K.: Probabilistic predicate transformers. ACM Transactions on Programming Languages and Systems, 18(3):325-353, 1996.
-
(1996)
ACM Transactions on Programming Languages and Systems
, vol.18
, Issue.3
, pp. 325-353
-
-
Morgan, C.C.1
McIver, A.K.2
Seidel, K.3
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NeS78
-
[NeS78] Needham, R. and Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Needham, R.1
Schroeder, M.2
-
25
-
-
0023247970
-
Efficient and timely mutual authentication
-
OtR87
-
[OtR87] Otway, D. and Rees, O.: Efficient and timely mutual authentication. Operating Systems Review, 21(1):8-10, 1987.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
26
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Pau98
-
[Pau98] Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
28
-
-
0029484376
-
Modelling and verifying key-exchange protocols using CSP and FDR
-
[Ros95b] IEEE Computer Society Press
-
[Ros95b] Roscoe, A.W.: Modelling and verifying key-exchange protocols using CSP and FDR. In Proceedings of 8th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 1995.
-
(1995)
Proceedings of 8th IEEE Computer Security Foundations Workshop
-
-
Roscoe, A.W.1
-
30
-
-
0031374451
-
Action systems for security specifications
-
Sin97
-
[Sin97] Sinclair, J.: Action systems for security specifications. Journal of of Computer Security, 5:129-154, 1997.
-
(1997)
Journal of of Computer Security
, vol.5
, pp. 129-154
-
-
Sinclair, J.1
|