-
2
-
-
33750247207
-
Verifying the SET purchase protocols
-
Computer Laboratory, Univ. Cambridge, Cambridge, U.K.
-
G. Bella, F. Massacci, and L. C. Paulson, "Verifying the SET Purchase Protocols," Computer Laboratory, Univ. Cambridge, Cambridge, U.K., 524, 2001.
-
(2001)
, pp. 524
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
3
-
-
84944035753
-
Formal verification of cardholder registration in SET
-
F. Cuppens, Y. Deswarte, D. Gollman, and M. Waidner, Eds.
-
G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano, "Formal verification of cardholder registration in SET," in Proc. Computer Security-ESORICS, LNCS 1895, F. Cuppens, Y. Deswarte, D. Gollman, and M. Waidner, Eds., 2000, pp. 159-174.
-
(2000)
Proc. Computer Security-ESORICS, LNCS 1895
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
4
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds.
-
G. Bella and L. C. Paulson, "Kerberos version IV: Inductive analysis of the secrecy goals," in Proc. Computer Security-ESORICS 98, LNCS 1485, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., 1998, pp. 361-375.
-
(1998)
Proc. Computer Security-ESORICS 98, LNCS 1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
5
-
-
0003568551
-
A survey of authentication protocol literature: Version 1.0
-
Tech. Rep., Univ. York, Dept. Comput. Sci. [Online]
-
J. Clark and J. Jacob. (1997) A Survey of Authentication Protocol Literature: Version 1.0. Tech. Rep., Univ. York, Dept. Comput. Sci. [Online]. Available: http://www.-users.cs.york.ac.uk/~jac/
-
(1997)
-
-
Clark, J.1
Jacob, J.2
-
8
-
-
18444377006
-
Security goals: Packet trajectories and strand spaces
-
R. Focardi and F. Gorrieri, Eds. New York: Springer-Verlag; Lecture Notes in Comp. Sci.
-
J. Guttman, "Security goals: Packet trajectories and strand spaces," in Foundations of Security Analysis and Design-Tutorial Lectures, R. Focardi and F. Gorrieri, Eds. New York: Springer-Verlag, 2001, vol. 2171, Lecture Notes in Comp. Sci., pp. 197-261.
-
(2001)
Foundations of Security Analysis and Design-Tutorial Lectures
, vol.2171
, pp. 197-261
-
-
Guttman, J.1
-
10
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
____, "Casper: A compiler for the analysis of security protocols," J. Comput. Sec., vol. 6, pp. 53-84, 1998.
-
(1998)
J. Comput. Sec.
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
11
-
-
0012842603
-
SET secure electronic transaction specification: Business description. Mastercard and VISA
-
[Online]
-
(1997) SET Secure Electronic Transaction Specification: Business Description. Mastercard and VISA. [Online]. Available: http://www.setco.org.set_specifications.html
-
(1997)
-
-
-
12
-
-
0012781105
-
SET secure electronic transaction specification: Programmer's guide. Mastercard & VISA
-
[Online]
-
(1997) SET Secure Electronic Transaction Specification: Programmer's Guide. Mastercard & VISA. [Online]. Available: http://www.setco.org/set_specifications.html
-
(1997)
-
-
-
13
-
-
0003503018
-
Isabelle/HOL: A proof assistant for higher-order logic
-
New York: Springer-Verlag
-
T. Nipkow, L. C. Paulson, and M. Wenzel, "Isabelle/HOL: A Proof Assistant for Higher-Order Logic," in LNCS Tutorial 2283. New York: Springer-Verlag, 2002.
-
(2002)
LNCS Tutorial 2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
14
-
-
84940106630
-
Analysis of the internet key exchange protocol using the NRL protocol analyzer
-
C. Meadows, "Analysis of the Internet key exchange protocol using the NRL protocol analyzer," in Proc. SSP, 1999, pp. 216-231.
-
Proc. SSP, 1999
, pp. 216-231
-
-
Meadows, C.1
-
15
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson, "The inductive approach to verifying cryptographic protocols," J. Comput. Sec., vol. 6, pp. 85-128, 1998
-
(1998)
J. Comput. Sec.
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
16
-
-
0034950756
-
Relations between secrets: Two formal analyses of the Yahalom protocol
-
____, "Relations between secrets: Two formal analyses of the Yahalom protocol," J. Comput. Sec., vol. 3, pp. 197-216, 2001.
-
(2001)
J. Comput. Sec.
, vol.3
, pp. 197-216
-
-
Paulson, L.C.1
-
17
-
-
0002219322
-
An attack on a recurive authentication protocol. A cautionary tale
-
P. Ryan and S. Schneider, "An attack on a recurive authentication protocol. A cautionary tale," Inform. Processing Lett., vol. 65, no. 15, pp. 7-16, 1998.
-
(1998)
Inform. Processing Lett.
, vol.65
, Issue.15
, pp. 7-16
-
-
Ryan, P.1
Schneider, S.2
|