-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Sept.
-
M. Abadi, "Secrecy by typing in security protocols," J. ACM, vol. 46, no. 5, pp. 749-786, Sept. 1999
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Spring
-
M. Abadi and P. Rogaway, "Reconciling two views of cryptography (the computational soundness of formal encryption)," J. Cryptology, vol. 5, pp. 103-127, Spring 2002.
-
(2002)
J. Cryptology
, vol.5
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
33750931288
-
Multiprotocol attacks and the public key infrastructure
-
J. Alves-Foss, "Multiprotocol attacks and the public key infrastructure," in 21st National Information Systems Security Conf., Arlington, VA, Oct. 1998, pp. 566-576.
-
21st National Information Systems Security Conf., Arlington, VA, Oct. 1998
, pp. 566-576
-
-
Alves-Foss, J.1
-
5
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
R. Amadio and D. Lugiez, "On the reachability problem in cryptographic protocols," in Proc. CONCUR, 2000, pp. 380-394.
-
Proc. CONCUR, 2000
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
6
-
-
84944035753
-
Formal verification of cardholder registration in SET
-
F. Cuppens, Ed. New York: Springer-Verlag
-
G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano, "Formal verification of cardholder registration in SET," in Computer Security-ESORICS 2000, F. Cuppens, Ed. New York: Springer-Verlag, 2000, pp. 159-174.
-
(2000)
Computer Security-ESORICS 2000
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
7
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goal
-
J.-J. Quisquater et al., Eds. New York: Springer-Verlag
-
G. Bella et al., "Kerberos version IV: Inductive analysis of the secrecy goal," in Computer Security-ESORICS 98, J.-J. Quisquater et al., Eds. New York: Springer-Verlag, 1998, pp. 361-375.
-
(1998)
Computer Security-ESORICS 98
, pp. 361-375
-
-
Bella, G.1
-
8
-
-
0012842066
-
The private communication technology protocol
-
[Online]
-
J. Benaloh, B. Lampson, D. Simon, T. Spies, and B. Yee. (1995) The private communication technology protocol. [Online]. available: draft-benaloch-pct-00.txt
-
(1995)
-
-
Benaloh, J.1
Lampson, B.2
Simon, D.3
Spies, T.4
Yee, B.5
-
12
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., vol. 8, pp. 18-36, Feb. 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
84948759231
-
A formal analysis of some properties of Kerberos V using MSR
-
F. Butler, I. Cervesato, A. Jaggard, and A. Scedrov, "A formal analysis of some properties of Kerberos V using MSR," in Proc. 15th Computer Security Foundations Workshop, June 2002, pp. 165-180.
-
Proc. 15th Computer Security Foundations Workshop, June 2002
, pp. 165-180
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.3
Scedrov, A.4
-
14
-
-
23044530199
-
Rational exchange-A formal model based on game theory
-
L. Buttyán and J.-P. Hubaux, "Rational exchange-A formal model based on game theory," in Proc. 2nd Int. Workshop Electronic Commerce (WELCOM'01). New York: Springer-Verlag, Nov. 16-17, 2001, pp. 114-126.
-
Proc. 2nd Int. Workshop Electronic Commerce (WELCOM'01). New York: Springer-Verlag, Nov. 16-17, 2001
, pp. 114-126
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
15
-
-
0032671775
-
A meta-notation for protocol analysis
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov, "A meta-notation for protocol analysis," in Proc. 12th IEEE Computer Security Foundations Workshop, June 1999, pp. 55-69.
-
Proc. 12th IEEE Computer Security Foundations Workshop, June 1999
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
16
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
P. Samarati, Ed., Nov.
-
R. Chadha, M. I. Kanovich, and A. Scedrov, "Inductive methods and contract-signing protocols," in Proc. 8th ACM Conf. Computer Communications Security, P. Samarati, Ed., Nov. 2001, pp. 176-185.
-
(2001)
Proc. 8th ACM Conf. Computer Communications Security
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.I.2
Scedrov, A.3
-
17
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital signatures
-
Feb.
-
D. Chaum, "Untraceable electronic mail, return addresses and digital signatures," Commun. ACM, vol. 24, pp. 84-88, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
18
-
-
84863949796
-
Partial order reductions for security protocol verification
-
E. Clark, S. Jha, and W. Marrero, "Partial order reductions for security protocol verification," in Proc. Tools and Algorithms for the Construction and Analysis of Systems, 2000, pp. 503-508.
-
Proc. Tools and Algorithms for the Construction and Analysis of Systems, 2000
, pp. 503-508
-
-
Clark, E.1
Jha, S.2
Marrero, W.3
-
21
-
-
0003902378
-
The CAPSL integrated protocol environment
-
SRI International, Palo Alto, CA, SRI-CSL-2002-02
-
G. Denker, J. Millen, and H. Ruess, "The CAPSL integrated protocol environment," SRI International, Palo Alto, CA, SRI-CSL-2002-02, 2000.
-
(2000)
-
-
Denker, G.1
Millen, J.2
Ruess, H.3
-
22
-
-
0020190170
-
On the security of ping-pong protocols
-
D. Dolev, S. Even, and R. Karp, "On the security of ping-pong protocols," Inform. Control, pp. 57-68, 1982.
-
(1982)
Inform. Control
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.3
-
23
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. IT-29, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
24
-
-
0032659620
-
CVS: A compiler for the analysis of cryptographic protocols
-
A. Durante, R. Focardi, and R. Gorrieri, "CVS: A compiler for the analysis of cryptographic protocols," in Proc. 12th IEEE Computer Security Foundations Workshop, June 1999, pp. 203-212.
-
Proc. 12th IEEE Computer Security Foundations Workshop, June 1999
, pp. 203-212
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
25
-
-
84949641590
-
Using a PVS embedding of CSP to verify authentication protocols
-
B. Dutertre and S. Schneider, "Using a PVS embedding of CSP to verify authentication protocols," in Proc. TPHOLS'97, 1997, pp. 121-136.
-
Proc. TPHOLS'97, 1997
, pp. 121-136
-
-
Dutertre, B.1
Schneider, S.2
-
27
-
-
0012796639
-
A security evaluation of IPSec
-
M. Blaze, J. Ioannides, A. Keromytis, and J. Smith, Eds. Readng, MA: Addison-Wesley, to be published
-
N. Ferguson and B. Schneier, "A security evaluation of IPSec," in The IPSec Papers, M. Blaze, J. Ioannides, A. Keromytis, and J. Smith, Eds. Readng, MA: Addison-Wesley, to be published.
-
The IPSec Papers
-
-
Ferguson, N.1
Schneier, B.2
-
29
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Feb.
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private internet connections," Commun. ACM, vol. 42, pp. 39-41, Feb. 1999.
-
(1999)
Commun. ACM
, vol.42
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
30
-
-
0003161603
-
Fail-stop protocols: An approach to designing secure protocols
-
R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, Eds. Piscataway, NJ: IEEE
-
L. Gong and P. Syverson, "Fail-stop protocols: An approach to designing secure protocols," in Dependable Computing for Critical Applications 5, R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, Eds. Piscataway, NJ: IEEE, 1998, pp. 79-100.
-
(1998)
Dependable Computing for Critical Applications 5
, pp. 79-100
-
-
Gong, L.1
Syverson, P.2
-
32
-
-
0033714403
-
Protocol independence through disjoint encryption
-
J. Guttman and J. T. Fäbrega, "Protocol independence through disjoint encryption," in Proc. 13th Computer Security Foundations Workshop, July 3-5, 2000, pp. 24-34.
-
Proc. 13th Computer Security Foundations Workshop, July 3-5, 2000
, pp. 24-34
-
-
Guttman, J.1
Fäbrega, J.T.2
-
33
-
-
0012793531
-
-
The Internet Key Exchange (IKE), Internet Engineering Task Force. [Online]
-
D. Harkins and D. Carrel. (1998) The Internet Key Exchange (IKE), Internet Engineering Task Force. [Online]. Available: http://ietf.org/rfc/rfc2409.txt
-
(1998)
-
-
Harkins, D.1
Carrel, D.2
-
35
-
-
0001924088
-
A model for secure protocols and their composition
-
Jan.
-
N. Heintze and J. D. Tygar, "A model for secure protocols and their composition," IEEE Trans. Softw. Eng., vol. 22, pp. 16-30, Jan. 1996.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
37
-
-
0004077031
-
Photuris: Session-key management protocol
-
Internet Engineering Task Force. [Online]
-
P. Karn and W. Simpson. (1999) Photuris: Session-Key Management Protocol. Internet Engineering Task Force. [Online]. Available: http://ietf.org/rfc/rfc2522.txt
-
(1999)
-
-
Karn, P.1
Simpson, W.2
-
38
-
-
84956985093
-
Chosen interactions and the chosen protocol attack
-
J. Kelsey and B. Schneier, "Chosen interactions and the chosen protocol attack," in Proc. Security Protocols, 5th Int. Workshop 1997, Apr. 1998, pp. 91-104.
-
Proc. Security Protocols, 5th Int. Workshop 1997, Apr. 1998
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
-
39
-
-
0024665744
-
Using formal methods to analyze encryption protocols
-
May
-
R. Kemmerer, "Using formal methods to analyze encryption protocols," IEEE J. Select. Areas Commun., vol. 7, pp. 448-457, May 1989.
-
(1989)
IEEE J. Select. Areas Commun.
, vol.7
, pp. 448-457
-
-
Kemmerer, R.1
-
40
-
-
58149520900
-
A game-based verification of nonrepuditation and fair exchange protocols
-
New York: Springer-Verlag
-
S. Kremer and J.-F. Raskin, "A game-based verification of nonrepuditation and fair exchange protocols," in CONCUR 2001-Concurrency Theory. New York: Springer-Verlag, 2001.
-
(2001)
CONCUR 2001-Concurrency Theory
-
-
Kremer, S.1
Raskin, J.-F.2
-
41
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov, "Probabilistic polynomial-time equivalence and security analysis," in FM'99-Formal Methods, J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag, 1999, pp. 776-793.
-
(1999)
FM'99-Formal Methods
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
42
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
D. Longley and S. Rigby, "An automatic search for security flaws in key management schemes," Comput. Security, vol. 11, pp. 75-90, 1992.
-
(1992)
Comput. Security
, vol.11
, pp. 75-90
-
-
Longley, D.1
Rigby, S.2
-
43
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," Softw.-Concepts Tools, vol. 17, no. 3, pp. 93-102, 1996.
-
(1996)
Softw.-Concepts Tools
, vol.17
, Issue.3
, pp. 93-102
-
-
Lowe, G.1
-
44
-
-
0033353968
-
Toward a completeness results for model checking security protocols
-
____, "Toward a completeness results for model checking security protocols," J. Comput. Security, vol. 7, pp. 89-146, 1999.
-
(1999)
J. Comput. Security
, vol.7
, pp. 89-146
-
-
Lowe, G.1
-
46
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows, "Applying formal methods to the analysis of a key management protocol," J. Comput. Security, vol. 1, pp. 5-53, 1992.
-
(1992)
J. Comput. Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
47
-
-
84940106630
-
Analysis of the internet key exchange protocol using the NRL protocol analyzer
-
____, "Analysis of the Internet key exchange protocol using the NRL protocol analyzer," in Proc. 1999 Symp. Security and Privacy, May 1999, pp. 216-213.
-
Proc. 1999 Symp. Security and Privacy, May 1999
, pp. 216-213
-
-
Meadows, C.1
-
49
-
-
0012795935
-
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
-
P. Degano, Ed., Geneva, Switzerland, July 8-9
-
____, "Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives," in Proc. 1st Workshop Issues Theory Security-WITS'00, P. Degano, Ed., Geneva, Switzerland, July 8-9, 2000, pp. 87-92.
-
(2000)
Proc. 1st Workshop Issues Theory Security-WITS'00
, pp. 87-92
-
-
Meadows, C.1
-
50
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
____, "Open issues in formal methods for cryptographic protocol analysis," in Proc. DISCEX 2000, Jan. 2000, pp. 237-250.
-
Proc. DISCEX 2000, Jan. 2000
, pp. 237-250
-
-
Meadows, C.1
-
51
-
-
0012853247
-
A unification algorithm for the group Diffie-Hellman protocol
-
C. Meadows and P. Narendran, "A unification algorithm for the group Diffie-Hellman protocol," presented at the WITS'02, Portland, OR, Jan. 2002.
-
WITS'02, Portland, OR, Jan. 2002
-
-
Meadows, C.1
Narendran, P.2
-
52
-
-
0035752113
-
Formalizing GDOI group key management requirements in NPATRL
-
C. Meadows, P. Syverson, and I. Cervesato, "Formalizing GDOI group key management requirements in NPATRL," in Proc. ACM Conf. Computer Communications Security, Nov. 2001, pp. 235-244.
-
Proc. ACM Conf. Computer Communications Security, Nov. 2001
, pp. 235-244
-
-
Meadows, C.1
Syverson, P.2
Cervesato, I.3
-
53
-
-
0004256761
-
Cryptographic protocols
-
Ph.D. dissertation, Georgia Inst. Technol., Atlanta, GA
-
M. J. Merritt, "Cryptographic protocols," Ph.D. dissertation, Georgia Inst. Technol., Atlanta, GA, 1983.
-
(1983)
-
-
Merritt, M.J.1
-
56
-
-
0023295108
-
The interrogator: Protocol security analysis
-
J. K. Millen, S. C. Clark, and S. B. Freedman, "The Interrogator: Protocol security analysis," IEEE Trans. Softw. Eng., vol. SE-13, pp. 274-288, 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
57
-
-
0003684287
-
CAPSL: Common authentication protocol specification language
-
The MITRE Corp. [Online]
-
J. K. Millen. (1997) CAPSL: Common authentication protocol specification language. The MITRE Corp. [Online]. Available: http://www.csl.sri.com/millen/capsl
-
(1997)
-
-
Millen, J.K.1
-
58
-
-
0030705405
-
Automated analysis of cryptographic protocols using Murø
-
J. Mitchell, M. Mitchell, and U. Stern, "Automated analysis of cryptographic protocols using Murø," in Proc. 1997 IEEE Symp. Security and Privacy, May 1997, pp. 141-151.
-
Proc. 1997 IEEE Symp. Security and Privacy, May 1997
, pp. 141-151
-
-
Mitchell, J.1
Mitchell, M.2
Stern, U.3
-
59
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
J. C. Mitchell, V. Shmatikov, and U. Stern, "Finite-state analysis of SSL 3.0," in Proc. 7th USENIX Security Symp., San Antonio, TX, 1998, pp. 201-216.
-
Proc. 7th USENIX Security Symp., San Antonio, TX, 1998
, pp. 201-216
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
60
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec.
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
62
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
L. C. Paulson, "Inductive analysis of the internet protocol TLS," ACM Trans. Comput. Syst. Security, vol. 2, no. 3, pp. 332-351, 1999.
-
(1999)
ACM Trans. Comput. Syst. Security
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
63
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
____, "The inductive approach to verifying cryptographic protocols," J. Comput. Security, vol. 6, no. 1/2, pp. 85-128, 1998.
-
(1998)
J. Comput. Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
64
-
-
4244028378
-
Guarded transitions in evolving specifications
-
Kestrel Inst.
-
D. Pavlovic and D. R. Smith, "Guarded Transitions in Evolving Specifications," Kestrel Inst., 2002.
-
(2002)
-
-
Pavlovic, D.1
Smith, D.R.2
-
66
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. 2000 IEEE Symp. Security and Privacy, May 2000, pp. 247-262.
-
Proc. 2000 IEEE Symp. Security and Privacy, May 2000
, pp. 247-262
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
71
-
-
84959345746
-
SET Secure Electronic Transactions LLC
-
The SET Specification.; [Online]
-
The SET Specification. SET Secure Electronic Transactions LLC. [Online]. Available: http://www.setco.org/set_specifications.html
-
-
-
-
73
-
-
0037076869
-
Finite-state analysis of two contract-signing protocols
-
June
-
V. Shmatikov and J. Mitchell, "Finite-state analysis of two contract-signing protocols," Theor. Comput. Sci., pp. 419-450, June 2000.
-
(2000)
Theor. Comput. Sci.
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.2
-
74
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin, and A. Perrig, "Athena: A novel approach to efficient automatic security protocol analysis," J. Comput. Security, vol. 9, pp. 47-74, 2001.
-
(2001)
J. Comput. Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
77
-
-
0033741481
-
Formal characterization and automated analysis of known-pair and chosen-text attacks
-
Apr.
-
S. Stubblebine and C. Meadows, "Formal characterization and automated analysis of known-pair and chosen-text attacks," IEEE J. Select. Areas Commun., vol. 18, pp. 571-581, Apr. 2000.
-
(2000)
IEEE J. Select. Areas Commun.
, vol.18
, pp. 571-581
-
-
Stubblebine, S.1
Meadows, C.2
-
78
-
-
84924758404
-
Group principals and the formalization of anonymity
-
J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag
-
P. Syverson and S. Stubblebine, "Group principals and the formalization of anonymity," in FM'99-Formal Methods, J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag, 1999, pp. 814-833.
-
(1999)
FM'99-Formal Methods
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
80
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
F. T. Fábrega, J. Herzog, and J. Guttman, "Strand spaces: Why is a security protocol correct?," in Proc. IEEE Symp. Security and Privacy, May 1998, pp. 160-171.
-
Proc. IEEE Symp. Security and Privacy, May 1998
, pp. 160-171
-
-
Fábrega, F.T.1
Herzog, J.2
Guttman, J.3
-
86
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
June
-
J. Zhou, "Fixing a security flaw in IKE protocols," Electron. Lett., vol. 35, pp. 1072-1073, June 1999.
-
(1999)
Electron. Lett.
, vol.35
, pp. 1072-1073
-
-
Zhou, J.1
|