-
1
-
-
84957872542
-
Reasoning about cryptographic protocols in the spi calculus
-
Proc. CONCUR'97,
-
M. Abadi, A.D. Gordon, Reasoning about cryptographic protocols in the spi calculus, in: Proc. CONCUR'97, Lecture Notes in Computer Science, Vol. 1243, 1997, pp. 59-73.
-
(1997)
Lecture Notes in Computer Science
, vol.1243
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
0032659620
-
CVS: A compiler for the analysis of cryptographic protocols
-
New York: IEEE Press
-
Durante A., Focardi R., Gorrieri R. CVS. A compiler for the analysis of cryptographic protocols Proc. CSFW'99. 1999;203-212 IEEE Press, New York.
-
(1999)
Proc. CSFW'99
, pp. 203-212
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
9
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi R., Gorrieri R. A classification of security properties for process algebras. J. Comput. Security. 3(1):1994/1995;5-33.
-
(1994)
J. Comput. Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi R., Gorrieri R. The compositional security checker: a tool for the verification of information flow security properties. IEEE Trans. Software Eng. 23(9):1997;550-571.
-
(1997)
IEEE Trans. Software Eng.
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
26844480899
-
Message authentication through non-interference
-
Berlin: Springer
-
Focardi R., Gorrieri R., Martinelli F. Message authentication through non-interference. Proc. Eighth Internat. Conf. in Algebraic Methodology and Software Technology (AMAST 2000), Lecture Notes in Computer Science. Vol. 1816:2000;258-272 Springer, Berlin.
-
(2000)
Proc. Eighth Internat. Conf. in Algebraic Methodology and Software Technology (AMAST 2000), Lecture Notes in Computer Science
, vol.1816
, pp. 258-272
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
12
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
U. Montanari (Ed.), Proc. 27th Internat. Coll. on Automata, Languages and Programming (ICALP'00)
-
R. Focardi, R. Gorrieri, F. Martinelli, Non interference for the analysis of cryptographic protocols, in: U. Montanari (Ed.), Proc. 27th Internat. Coll. on Automata, Languages and Programming (ICALP'00), Lecture Notes in Computer Science, Vol. 1853, July 2000, pp. 354-372.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
17
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. TACAS'96
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proc. TACAS'96, Lecture Notes in Computer Science, Vol. 1055, 1996, pp. 146-166.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 146-166
-
-
Lowe, G.1
-
18
-
-
0030708255
-
A hierarchy of authentication specification
-
New York: IEEE Press
-
Lowe G. A hierarchy of authentication specification. Proc. 10th Computer Security Foundation Workshop. 1997;31-43 IEEE Press, New York.
-
(1997)
Proc. 10th Computer Security Foundation Workshop
, pp. 31-43
-
-
Lowe, G.1
-
19
-
-
0003317915
-
A model checker for authentication protocols
-
Rutgers University, September
-
W. Marrero, E. Clarke, S. Jha, A model checker for authentication protocols, in: Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.
-
(1997)
Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Marrero, W.1
Clarke, E.2
Jha, S.3
-
20
-
-
0000544858
-
Languages for description and analysis of authentication protocols
-
Singapore: World Scientific
-
Martinelli F. Languages for description and analysis of authentication protocols. Proc. ICTCS'98. 1998;304-315 World Scientific, Singapore.
-
(1998)
Proc. ICTCS'98
, pp. 304-315
-
-
Martinelli, F.1
-
21
-
-
0031645024
-
Partial model checking and theorem proving for ensuring security properties
-
New York: IEEE Press
-
Martinelli F. Partial model checking and theorem proving for ensuring security properties. Proc. CSFW'98, 1998;44-52 IEEE Press, New York.
-
(1998)
Proc. CSFW'98,
, pp. 44-52
-
-
Martinelli, F.1
-
22
-
-
4243442726
-
-
Tech. Report IAT-B4-006, July, accepted for publication on TCS (under minor revisions)
-
F. Martinelli, Analysis of security protocols as open systems, Tech. Report IAT-B4-006, July 2001, accepted for publication on TCS (under minor revisions).
-
(2001)
Analysis of security protocols as open systems
-
-
Martinelli, F.1
-
24
-
-
0032646572
-
Process algebra and non-interference
-
New York: IEEE Press
-
Ryan P.Y.A., Schneider S. Process algebra and non-interference. Proc. CSFW'99. 1999;214-227 IEEE Press, New York.
-
(1999)
Proc. CSFW'99
, pp. 214-227
-
-
Ryan, P.Y.A.1
Schneider, S.2
-
26
-
-
0031633214
-
Formal analysis of a non-repudiation protocol
-
New York: IEEE Press
-
Schneider S. Formal analysis of a non-repudiation protocol. Proc. CSFW'98. 1998;54-65 IEEE Press, New York.
-
(1998)
Proc. CSFW'98
, pp. 54-65
-
-
Schneider, S.1
-
27
-
-
0000937825
-
Verifying authentication protocols in CSP
-
Schneider S. Verifying authentication protocols in CSP. IEEE Trans. Software Eng. 24(9):1998.
-
(1998)
IEEE Trans. Software Eng.
, vol.24
, Issue.9
-
-
Schneider, S.1
|