-
4
-
-
0012005941
-
Abstract machines for communication security
-
Washington, Brussels, Tokyo: IEEE Computer Society Press
-
Bieber P., Boulahia-Cuppens N., Lehmann T., van Wickeren E. Abstract machines for communication security. Proc. Computer Security Foundations Workshop VI (CSFW '93). 1993;137-146 IEEE Computer Society Press, Washington, Brussels, Tokyo.
-
(1993)
Proc. Computer Security Foundations Workshop VI (CSFW '93)
, pp. 137-146
-
-
Bieber, P.1
Boulahia-Cuppens, N.2
Lehmann, T.3
Van Wickeren, E.4
-
5
-
-
0029711237
-
An approach to the formal verification of cryptographic protocols
-
New Delhi, India, New York: ACM Press
-
Bolignano D. An approach to the formal verification of cryptographic protocols. Proc. 3rd ACM Conf. on Computer and Communication Security, CCS'96, New Delhi, India. 1996;106-118 ACM Press, New York.
-
(1996)
Proc. 3rd ACM Conf. on Computer and Communication Security, CCS'96
, pp. 106-118
-
-
Bolignano, D.1
-
6
-
-
0027612025
-
Security architectures using formal methods
-
Boyd C. 'Security architectures using formal methods. J. Select. Areas Commun. 11(5):1990;694-701.
-
(1990)
J. Select. Areas Commun.
, vol.11
, Issue.5
, pp. 694-701
-
-
Boyd, C.1
-
7
-
-
84896813792
-
A framework for authentication
-
Proc. European Symp. on Research in Computer Security, ESORICS 92, Berlin: Springer
-
C. Boyd C. A framework for authentication. Proc. European Symp. on Research in Computer Security, ESORICS 92, Lecture Notes in Computer Science. Vol. 648:1992;273-292 Springer, Berlin.
-
(1992)
Lecture Notes in Computer Science
, vol.648
, pp. 273-292
-
-
Boyd, C.1
-
9
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi, R. Needham, A logic of authentication, in: Proc. Royal Society of London A, Vol. 426, 1998, pp. 233-271.
-
(1998)
Proc. Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
14
-
-
0025494721
-
Tableau-based model checking in the propositional mu-calculus
-
Cleaveland R. Tableau-based model checking in the propositional mu-calculus. Acta Inform. 27(8):1990;725-747.
-
(1990)
Acta Inform.
, vol.27
, Issue.8
, pp. 725-747
-
-
Cleaveland, R.1
-
15
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie W., Oorschot P.C.V., Wiener M.J. Authentication and authenticated key exchanges. Designs, Codes Cryptography J. 2(2):1992;107-125.
-
(1992)
Designs, Codes Cryptography J.
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.C.V.2
Wiener, M.J.3
-
16
-
-
84957366356
-
The murphi verification system
-
Rajeev Alur, A. Henzinger Thomas, Proc. 8th Internat. Conf. on Computer Aided Verification CAV, New Brunswick, NJ, USA: Springer
-
Dill D.L. The murphi verification system. Alur Rajeev, A. Henzinger Thomas Proc. 8th Internat. Conf. on Computer Aided Verification CAV, Lecture Notes in Computer Science. Vol. 1102:1996;390-393 Springer, New Brunswick, NJ, USA.
-
(1996)
Lecture Notes in Computer Science
, vol.1102
, pp. 390-393
-
-
Dill, D.L.1
-
18
-
-
0025771853
-
Applying a formal analysis technique to the CCITT X.509 Strong two-way authentication protocol
-
Gaarder K., Snekkenes E. Applying a formal analysis technique to the CCITT X.509 Strong two-way authentication protocol. J. Cryptol. 3(2):1991;81-98.
-
(1991)
J. Cryptol.
, vol.3
, Issue.2
, pp. 81-98
-
-
Gaarder, K.1
Snekkenes, E.2
-
19
-
-
0003892537
-
-
Technical Report, Formal Systems (Europe) Ltd
-
P. Gardiner, D. Jackson, J. Hulance, B. Roscoe, Security modeling in CSP and FDR: Deliverable bundle 2, Technical Report, Formal Systems (Europe) Ltd, 1996.
-
(1996)
Security modeling in CSP and FDR: Deliverable bundle
, vol.2
-
-
Gardiner, P.1
Jackson, D.2
Hulance, J.3
Roscoe, B.4
-
20
-
-
0003892537
-
-
Technical Report, Formal Systems (Europe) Ltd
-
P. Gardiner, D. Jackson, B. Roscoe, Security modeling in CSP and FDR: Deliverable bundle 3, Technical Report, Formal Systems (Europe) Ltd, 1996.
-
(1996)
Security modeling in CSP and FDR: Deliverable bundle
, vol.3
-
-
Gardiner, P.1
Jackson, D.2
Roscoe, B.3
-
22
-
-
0029713154
-
What do we mean by entity authentication
-
Silver Spring, MD: IEEE Computer Society Press
-
Gollman D. What do we mean by entity authentication. Proc. 1996 IEEE Symp. on Research in Security and Privacy. 1996;46-54 IEEE Computer Society Press, Silver Spring, MD.
-
(1996)
Proc. 1996 IEEE Symp. on Research in Security and Privacy
, pp. 46-54
-
-
Gollman, D.1
-
23
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
D. Cooper, & T. Lunt. Silver Spring, MD: IEEE Computer Society Press
-
Gong L., Needham R., Yahalom R. Reasoning about belief in cryptographic protocols. Cooper D., Lunt T. Proc. 1990 IEEE Symp. on Research in Security and Privacy. 1990;234-248 IEEE Computer Society Press, Silver Spring, MD.
-
(1990)
Proc. 1990 IEEE Symp. on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
24
-
-
9444219752
-
Proof theory and automated deduction
-
Dordrecht: Kluwer Academic Publishers
-
Goubault-Larrecq J., Mackie I. Proof Theory and Automated Deduction. Applied Logic Series. Vol. 6:1997;Kluwer Academic Publishers, Dordrecht.
-
(1997)
Applied Logic Series
, vol.6
-
-
Goubault-Larrecq, J.1
Mackie, I.2
-
26
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
P. Syverson. Cambridge, UK: IEEE Computer Society Press
-
Iliano C., Durgin N., Lincoln P., Mitchell J., Scedrov A. Relating strands and multiset rewriting for security protocol analysis. Syverson P. Proc. 13th IEEE Computer Security Foundations Workshop - CSFW'00. 2000;35-51 IEEE Computer Society Press, Cambridge, UK.
-
(2000)
Proc. 13th IEEE Computer Security Foundations Workshop - CSFW'00
, pp. 35-51
-
-
Iliano, C.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
27
-
-
0023248072
-
Using formal verification techniques to analyze encryption protocols
-
Silver Spring, MD: IEEE Computer Society Press
-
Kemmerer R.A. Using formal verification techniques to analyze encryption protocols. Proc. 1987 IEEE Symp. on Research in Security and Privacy. 1987;134-139 IEEE Computer Society Press, Silver Spring, MD.
-
(1987)
Proc. 1987 IEEE Symp. on Research in Security and Privacy
, pp. 134-139
-
-
Kemmerer, R.A.1
-
28
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
Kemmerer R.A. Analyzing encryption protocols using formal verification techniques. IEEE J. Select. Areas Commun. 7(4):1989;448-457.
-
(1989)
IEEE J. Select. Areas Commun.
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.A.1
-
29
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer R., Meadows C., Millen J. Three systems for cryptographic protocol analysis. J. Cryptol. 7(2):1994;79-130.
-
(1994)
J. Cryptol.
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
30
-
-
0042664779
-
Authentication in distributed systems: A bibliography
-
Liebl A. Authentication in distributed systems. a bibliography Oper. Systems Rev. 27(4):1993;122-136.
-
(1993)
Oper. Systems Rev.
, vol.27
, Issue.4
, pp. 122-136
-
-
Liebl, A.1
-
31
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
Lowe G. An attack on the Needham-Schroeder public key authentication protocol. Inform. Process. Lett. 56(3):1995;131-136.
-
(1995)
Inform. Process. Lett.
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
35
-
-
85056648637
-
Towards the formal analysis of security protocols
-
Silver Spring, MD: IEEE Computer Society Press
-
Mao W., Boyd C. Towards the formal analysis of security protocols. Proc. Computer Security Foundations Workshop VI. 1993;147-158 IEEE Computer Society Press, Silver Spring, MD.
-
(1993)
Proc. Computer Security Foundations Workshop VI
, pp. 147-158
-
-
Mao, W.1
Boyd, C.2
-
36
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
ASIACRYPT: Advances in Cryptology - ASIACRYPT: Internat. Conf. on the Theory and Application of Cryptology, Springer, Berlin
-
C. Meadows, Formal verification of cryptographic protocols: A survey, in: ASIACRYPT: Advances in Cryptology - ASIACRYPT: Internat. Conf. on the Theory and Application of Cryptology, Lecture Notes in Computer Science, Vol. 917, Springer, Berlin, 1994, pp. 133-150.
-
(1994)
Lecture Notes in Computer Science
, vol.917
, pp. 133-150
-
-
Meadows, C.1
-
37
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C. The NRL protocol analyzer: an overview. J. Logic Programming. 26:1996;113-131.
-
(1996)
J. Logic Programming
, vol.26
, pp. 113-131
-
-
Meadows, C.1
-
38
-
-
0003604327
-
-
Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh
-
R. Milner, The polyadic π -calculus: A tutorial, Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, 1991.
-
(1991)
The polyadic π -calculus: A tutorial
-
-
Milner, R.1
-
39
-
-
0004181456
-
-
Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh
-
R. Milner, J. Parrow, D. Walker, A calculus of mobile processes, Technical Report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, 1989.
-
(1989)
A calculus of mobile processes
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
40
-
-
0002521052
-
A calculus of mobile processes (Parts I and II)
-
Milner R., Parrow J., Walker D. A calculus of mobile processes (Parts I and II). Inform. Comput. 100:1992;1-77.
-
(1992)
Inform. Comput.
, vol.100
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
41
-
-
0030705405
-
Automated analysis of cryptographic protocols using murphi
-
Silver Spring, MD: IEEE Computer Society Press
-
Mitchell J.C., Mitchell M., Stern U. Automated analysis of cryptographic protocols using murphi. Proc. 1997 IEEE Symp. on Security and Privacy. 1997;141-153 IEEE Computer Society Press, Silver Spring, MD.
-
(1997)
Proc. 1997 IEEE Symp. on Security and Privacy
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
42
-
-
0012003070
-
Finite-state analysis of SSL 3.0
-
September 3-5, 1997, DIMACS Center, CoRE Building, Rutgers University, New Jersey, USA
-
J.C. Mitchell, V. Shmatikov, U. Stern, Finite-state analysis of SSL 3.0, in: Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, September 3-5, 1997, DIMACS Center, CoRE Building, Rutgers University, New Jersey, USA, 1997, pp. 1-20.
-
(1997)
Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols
, pp. 1-20
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
43
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security. 6:1998;85-128.
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
44
-
-
0029713842
-
Intentional specifications of security protocols
-
Silver Spring, MD: IEEE Computer Society Press
-
Roscoe A.W. Intentional specifications of security protocols. Proc. 9th IEEE Computer Security Foundations Workshop. 1996;28-38 IEEE Computer Society Press, Silver Spring, MD.
-
(1996)
Proc. 9th IEEE Computer Security Foundations Workshop
, pp. 28-38
-
-
Roscoe, A.W.1
-
46
-
-
23544459288
-
-
Technical Report No. 93-7, Internal Draft, Center for Information Technology Integration, University of Michigan, MI
-
A.D. Rubin, P. Honeyman, Formal methods for the analysis of authentication protocols, Technical Report No. 93-7, Internal Draft, Center for Information Technology Integration, University of Michigan, MI, 1993.
-
(1993)
Formal methods for the analysis of authentication protocols
-
-
Rubin, A.D.1
Honeyman, P.2
-
47
-
-
0029721645
-
Security properties and CSP
-
Silver Spring, MD: IEEE Computer Society Press
-
Schneider S. Security properties and CSP. Proc. 1996 IEEE Symp. on Security and Privacy. 1996;174-187 IEEE Computer Society Press, Silver Spring, MD.
-
(1996)
Proc. 1996 IEEE Symp. on Security and Privacy
, pp. 174-187
-
-
Schneider, S.1
-
50
-
-
0003432553
-
-
Ph.D. Thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defense Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway
-
E. Snekkenes, Formal specification and analysis of cryptographic protocols, Ph.D. Thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defense Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway, 1995.
-
(1995)
Formal specification and analysis of cryptographic protocols
-
-
Snekkenes, E.1
-
51
-
-
0026153654
-
The use of logic in the analysis of cryptographic protocols
-
T.F. Lunt, & J. McLean. Silver Spring, MD: IEEE Computer Society Press
-
Syverson P. The use of logic in the analysis of cryptographic protocols. Lunt T.F., McLean J. Proc. 1991 IEEE Symp. on Security and Privacy. 1991;156-170 IEEE Computer Society Press, Silver Spring, MD.
-
(1991)
Proc. 1991 IEEE Symp. on Security and Privacy
, pp. 156-170
-
-
Syverson, P.1
-
52
-
-
84974755213
-
Knowledge, belief, and semantics in the analysis of cryptographic protocols
-
Syverson P. Knowledge, belief, and semantics in the analysis of cryptographic protocols. J. Comput. Security. 1(3):1992;317-334.
-
(1992)
J. Comput. Security
, vol.1
, Issue.3
, pp. 317-334
-
-
Syverson, P.1
-
53
-
-
0001937830
-
A formal language for cryptographic protocol requirements
-
Syverson P., Meadows C. A formal language for cryptographic protocol requirements. Designs, Codes Cryptography. 7(1/2):1996;27-59.
-
(1996)
Designs, Codes Cryptography
, vol.7
, Issue.1-2
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
-
54
-
-
0012013903
-
Dolev-Yao is no better than Machiavelli
-
P. Degano (Ed.), Geneva, Switzerland
-
P. Syverson, C. Meadows, C. Iliano, Dolev-Yao is no better than Machiavelli, in: P. Degano (Ed.), Proc. 1st Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, 2000, pp. 87-92.
-
(2000)
Proc. 1st Workshop on Issues in the Theory of Security - WITS'00
, pp. 87-92
-
-
Syverson, P.1
Meadows, C.2
Iliano, C.3
-
55
-
-
84972541021
-
A lattice-theoretical fixpoint theorem and its applications
-
Tarski A. A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math. 5:1955;285-309.
-
(1955)
Pacific J. Math.
, vol.5
, pp. 285-309
-
-
Tarski, A.1
-
56
-
-
0011996468
-
-
The commission of the European Communities CEC DG-XIII, Security Investigation Final Report, Technical Report No. S2011/7000/D010 7000 1000, CEC, 1993
-
The commission of the European Communities CEC DG-XIII, Security Investigation Final Report, Technical Report No. S2011/7000/D010 7000 1000, CEC, 1993.
-
-
-
-
58
-
-
0024936551
-
Use of formal techniques in the specification of authentication protocols
-
Varadharajan V. Use of formal techniques in the specification of authentication protocols. Comput. Standards Interfaces. 9:1990;203-215.
-
(1990)
Comput. Standards Interfaces
, vol.9
, pp. 203-215
-
-
Varadharajan, V.1
-
59
-
-
0002508587
-
A lesson on authentication protocol design
-
Woo T.Y.C., Lam S.S. A lesson on authentication protocol design. Oper. Systems Rev. 28:1994;24-37.
-
(1994)
Oper. Systems Rev.
, vol.28
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|