-
1
-
-
84883268548
-
Authentication and delegation with smartcards
-
Research Report 125, Digital - System Research Center
-
M. Abadi, M. Burrows, C. Kaufman and B. Lampson, Authentication and delegation with smartcards, Research Report 125, Digital - System Research Center, 1994.
-
(1994)
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
3
-
-
0000694402
-
Low cost attacks on tamper resistant devices
-
M. Lomas et al., eds, LNCS 1361, Springer-Verlag
-
R.J. Anderson and M.J. Kuhn, Low cost attacks on tamper resistant devices, in: Proc. of the 5th International Workshop on Security Protocols, M. Lomas et al., eds, LNCS 1361, Springer-Verlag, 1997, pp. 125-136.
-
(1997)
Proc. of the 5th International Workshop on Security Protocols
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.J.2
-
4
-
-
4243352588
-
Message reception in the inductive approach
-
Research Report 460, Computer Laboratory, University of Cambridge; Available on the Internet
-
G. Bella, Message reception in the inductive approach. Research Report 460, Computer Laboratory, University of Cambridge, 1999. Available on the Internet.
-
(1999)
-
-
Bella, G.1
-
5
-
-
84947223089
-
Modelling agents' knowledge inductively
-
B. Christianson, B. Crispo, J.A. Malcolm and R. Michael, eds, LNCS 1796, Springer-Verlag
-
G. Bella, Modelling agents' knowledge inductively, in: Proc. of the 7th International Workshop on Security Protocols, B. Christianson, B. Crispo, J.A. Malcolm and R. Michael, eds, LNCS 1796, Springer-Verlag, 1999, pp. 85-94.
-
(1999)
Proc. of the 7th International Workshop on Security Protocols
, pp. 85-94
-
-
Bella, G.1
-
7
-
-
0012639813
-
Inductive verification of cryptographic protocols
-
PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge; Available on the Internet
-
G. Bella, Inductive verification of cryptographic protocols. PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge, 2000. Available on the Internet.
-
(2000)
-
-
Bella, G.1
-
8
-
-
84937391830
-
Mechanising a protocol for smart cards
-
Attali and T. Jensen, eds. LNCS 2140, Springer-Verlag
-
G. Bella, Mechanising a protocol for smart cards, in: Proc. of International Conference on Research in Smart Cards (e-Smart '01), I. Attali and T. Jensen, eds. LNCS 2140, Springer-Verlag, 2001. pp, 19-33.
-
(2001)
Proc. of International Conference on Research in Smart Cards (e-Smart '01), I
, pp. 19-33
-
-
Bella, G.1
-
9
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds, LNCS 1485, Springer-Verlag
-
G. Bella and L.C. Paulson, Kerberos version IV: inductive analysis of the secrecy goals, in: Proc. of the 5th European Symposium on Research in Computer Security (ESORICS '98), J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds, LNCS 1485, Springer-Verlag, 1998, pp. 361-375.
-
(1998)
Proc. of the 5th European Symposium on Research in Computer Security (ESORICS '98)
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
14
-
-
85036689619
-
-
Forrester Research
-
Forrester Research, http://www.forrester.com.
-
-
-
-
15
-
-
84955592726
-
Integrating smart cards into authentication systems
-
E. Dawson and J. Colić, eds. LNCS 1029
-
G. Gaskell and M. Looi, Integrating smart cards into authentication systems, in: Proc. of the 1st International Conference on Cryptography: Policy and Algorithms, E. Dawson and J. Colić, eds. LNCS 1029, 1995, pp. 270-281.
-
(1995)
Proc. of the 1st International Conference on Cryptography: Policy and Algorithms
, pp. 270-281
-
-
Gaskell, G.1
Looi, M.2
-
18
-
-
84937478425
-
Implementation of a provably secure, smartcard-based key distribution protocol
-
J.-J. Quisquater and B. Schneier, eds.
-
R. Jerdonek, P. Honeyman, K. Coffman, J. Rees and K. Wheeler, Implementation of a provably secure, smartcard-based key distribution protocol, in: Proc. of the 3rd Smart Card Research and Advanced Application Conference (CARDIS '98), J.-J. Quisquater and B. Schneier, eds. 1998.
-
(1998)
Proc. of the 3rd Smart Card Research and Advanced Application Conference (CARDIS '98)
-
-
Jerdonek, R.1
Honeyman, P.2
Coffman, K.3
Rees, J.4
Wheeler, K.5
-
20
-
-
84949023663
-
Secret-key agreement without public-key cryptography
-
D.R. Stinson, ed., LNCS 773, Springer-Verlag
-
T. Leighton and S. Micali, Secret-key Agreement without public-key cryptography. in: Proc. of Advances in Cryptography - CRYPTO '93, D.R. Stinson, ed., LNCS 773, Springer-Verlag, 1993. pp. 456-479.
-
(1993)
Proc. of Advances in Cryptography - CRYPTO '93
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
21
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using CSP and FDR
-
T. Margaria and B. Steffen, eds, LNCS 1055, Springer-Verlag
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. in: Proc of the 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS '96), T. Margaria and B. Steffen, eds, LNCS 1055, Springer-Verlag, 1996, pp. 147-166.
-
(1996)
Proc of the 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS '96)
, pp. 147-166
-
-
Lowe, G.1
-
22
-
-
0002557564
-
Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective
-
R. Hirschfeld, ed., LNCS 1318. Springer-Verlag
-
D.P. Maher, Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective. in: Proc. of Financial Cryptography '97, R. Hirschfeld, ed., LNCS 1318. Springer-Verlag. 1997. pp. 109-121.
-
(1997)
Proc. of Financial Cryptography '97
, pp. 109-121
-
-
Maher, D.P.1
-
23
-
-
0012685222
-
-
Private conversations
-
C. Meadows, Private conversations, 2001.
-
(2001)
-
-
Meadows, C.1
-
24
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Press
-
C. Meadows, Open issues in formal methods for cryptographic protocol analysis, in: Proc. of DISCEX 2000, IEEE Press, 2000.
-
(2000)
Proc. of DISCEX 2000
-
-
Meadows, C.1
-
25
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C.A. Meadows, The NRL protocol analyzer: an overview, Journal of Logic Programming 26(2) (1996), 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.A.1
-
26
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998), 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
30
-
-
84947904235
-
Session key distribution using smart cards
-
U. Maurer, ed., LNCS 1070, Springer-Verlag
-
V. Shoup and A. Rubin, Session key distribution using smart cards, in: Advances in Cryptology - Eurocrypt '96, U. Maurer, ed., LNCS 1070, Springer-Verlag, 1996, pp. 321-331.
-
(1996)
Advances in Cryptology - Eurocrypt '96
, pp. 321-331
-
-
Shoup, V.1
Rubin, A.2
|