-
1
-
-
84863900858
-
Mechanising BAN Kerberos by the inductive method
-
G. Bella and L. Paulson, Mechanising BAN Kerberos by the inductive method, in: CAV 10, 1998, pp. 416-427.
-
(1998)
CAV
, vol.10
, pp. 416-427
-
-
Bella, G.1
Paulson, L.2
-
2
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
G. Bella and L.C. Paulson, Kerberos version IV: Inductive analysis of the secrecy goals, in: ESORICS 5, 1998, pp. 361-375.
-
(1998)
ESORICS
, vol.5
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
3
-
-
0005078946
-
Entity authentication and key distribution (extended abstract)
-
M. Bellaire and P. Rogaway, Entity authentication and key distribution (extended abstract), in: CRYPTO 13, 1993.
-
(1993)
CRYPTO
, vol.13
-
-
Bellaire, M.1
Rogaway, P.2
-
4
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
M. Bellare and P. Rogaway, Provably secure session key distribution: the three party case, in: STOC 27, 1995, pp. 57-66.
-
(1995)
STOC
, vol.27
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0034822279
-
An efficient cryptographic prolotocol verifier based on prolog rules
-
B. Blanchet, An efficient cryptographic prolotocol verifier based on prolog rules, in: CSFW 14, 2001.
-
(2001)
CSFW
, vol.14
-
-
Blanchet, B.1
-
6
-
-
0003246105
-
Symbolic analysis of cryptographic protocols in the spi-calculus
-
M. Boreale, Symbolic analysis of cryptographic protocols in the spi-calculus, in: ICALP '01, 2001.
-
(2001)
ICALP '01
-
-
Boreale, M.1
-
12
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: CSFW 13, 2000, pp. 255-268.
-
(2000)
CSFW
, vol.13
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
13
-
-
0033683607
-
Towards automatic verification of authentication protocols on an unbounded network
-
J. Heather and S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: CSFW 13, 2000, pp. 132-143.
-
(2000)
CSFW
, vol.13
, pp. 132-143
-
-
Heather, J.1
Schneider, S.2
-
15
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe, Casper: A compiler for the analysis of security protocols, in: CSFW 10, 1997.
-
(1997)
CSFW
, vol.10
-
-
Lowe, G.1
-
17
-
-
0029700221
-
Language generation and verification in the NRL protocol analyzer
-
C. Meadows, Language generation and verification in the NRL protocol analyzer, in: CSFW 9, 1996, pp. 48-61.
-
(1996)
CSFW
, vol.9
, pp. 48-61
-
-
Meadows, C.1
-
18
-
-
0033682446
-
Invariant generation techniques in cryptographic protocol analysis
-
C. Meadows, Invariant generation techniques in cryptographic protocol analysis, in: CSFW 13, 2000.
-
(2000)
CSFW
, vol.13
-
-
Meadows, C.1
-
21
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson, The inductive approach to verifying cryptographic protocols, JCS 6 (1998), 85-128.
-
(1998)
JCS
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
22
-
-
0030684956
-
Verifying authentication protocols with CSP
-
S. Schneider, Verifying authentication protocols with CSP, in: CSFW 10, 1997.
-
(1997)
CSFW
, vol.10
-
-
Schneider, S.1
-
23
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
D. Song, Athena: A new efficient automatic checker for security protocol analysis, in: CSFW 12, 1999.
-
(1999)
CSFW
, vol.12
-
-
Song, D.1
-
25
-
-
0001592091
-
Towards an automatic analysis of security protocols in first-order logic
-
C. Weidenbach, Towards an automatic analysis of security protocols in first-order logic, in: CADE 16, 1999.
-
(1999)
CADE
, vol.16
-
-
Weidenbach, C.1
-
26
-
-
0013128536
-
System description: SPASS version 1.0.0
-
C. Weidenbach, B. Afshordel, U. Brahm, C. Cohrs, T. Engel, E. Keen, C. Theobalt and D. Topić, System description: SPASS version 1.0.0, in: CADE 15, 1999, pp. 78-382.
-
(1999)
CADE
, vol.15
, pp. 78-382
-
-
Weidenbach, C.1
Afshordel, B.2
Brahm, U.3
Cohrs, C.4
Engel, T.5
Keen, E.6
Theobalt, C.7
Topić, D.8
|