-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi M. Secrecy by typing in security protocols. J. ACM. 46(5):1999;749-786.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0002652530
-
Security protocols and their properties
-
F.L. Bauer, R. Steinbrueggen (Eds.), Foundations of Secure Computation, NATO Science Series, IOS Press, Amsterdam, Marktoberdorf, Germany
-
M. Abadi, Security protocols and their properties, in: F.L. Bauer, R. Steinbrueggen (Eds.), Foundations of Secure Computation, NATO Science Series, IOS Press, Amsterdam, 2000, pp. 39-60. Volume for the 20th International Summer School on Foundations of Secure Computation, Marktoberdorf, Germany, 1999.
-
(1999)
20th International Summer School on Foundations of Secure Computation
, pp. 39-60
-
-
Abadi, M.1
-
4
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
An extended version appeared as Digital Equipment Corporation Systems Research Center Report No. 149, January 1998
-
Abadi M., Gordon A.D. A calculus for cryptographic protocols. the spi calculus Inform. and Comput. 148(1):1999;1-70. An extended version appeared as Digital Equipment Corporation Systems Research Center Report No. 149, January 1998.
-
(1999)
Inform. and Comput.
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Abadi M., Needham R. Prudent engineering practice for cryptographic protocols. IEEE Trans. Software Engng. 22(1):1996;6-15.
-
(1996)
IEEE Trans. Software Engng.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
6
-
-
84957714601
-
Robustness principles for public key protocols
-
Anderson R., Needham R. Robustness principles for public key protocols. Proc. Crypto '95. 1995;236-247.
-
(1995)
Proc. Crypto '95
, pp. 236-247
-
-
Anderson, R.1
Needham, R.2
-
7
-
-
0029516756
-
Network objects
-
Birrell A., Nelson G., Owicki S., Wobber E. Network objects. Software Practice Exp. S4(25):1995;87-130.
-
(1995)
Software Practice Exp.
, vol.S4
, Issue.25
, pp. 87-130
-
-
Birrell, A.1
Nelson, G.2
Owicki, S.3
Wobber, E.4
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
Silver Spring, MD: IEEE Computer Society, June
-
Blanchet B. An efficient cryptographic protocol verifier based on Prolog rules. 14th IEEE Computer Security Foundations Workshop (CSFW-14). June 2001;82-96 IEEE Computer Society, Silver Spring, MD.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
10
-
-
84945976575
-
Control flow analysis for the π-calculus
-
CONCUR'98: Concurrency Theory, Berlin: Springer, September
-
Bodei C., Degano P., Nielson F., Nielson H.R. Control flow analysis for the. π-calculus CONCUR'98: Concurrency Theory. Lecture Notes in Computer Science. vol. 1466:September 1998;84-98 Springer, Berlin.
-
(1998)
Lecture Notes in Computer Science
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
11
-
-
84865445501
-
Secrecy and group creation
-
C. Palamidessi (Ed.), CONCUR 2000: Concurrency Theory. Berlin: Springer, August
-
Cardelli L., Ghelli G., Gordon A.D. Secrecy and group creation. Palamidessi C. CONCUR 2000. Concurrency Theory Lecture Notes in Computer Science. vol. 1877:August 2000;365-379 Springer, Berlin.
-
(2000)
Lecture Notes in Computer Science
, vol.1877
, pp. 365-379
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
12
-
-
0032671775
-
A meta-notation for protocol analysis
-
Silver Spring, MD: IEEE Computer Society Press, June
-
Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A. A meta-notation for protocol analysis. Proc. 12th IEEE Computer Security Foundations Workshop (CSFW'99). June 1999;55-69 IEEE Computer Society Press, Silver Spring, MD.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop (CSFW'99)
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
13
-
-
0003332235
-
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
-
Rutgers University, New Jersey, September
-
M. Debbabi, M. Mejri, N. Tawbi, I. Yahmadi, A new algorithm for the automatic verification of authentication protocols: from specifications to flaws and attack scenarios, in: Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, September 1997.
-
(1997)
Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Debbabi, M.1
Mejri, M.2
Tawbi, N.3
Yahmadi, I.4
-
14
-
-
0003300896
-
Protocol specification and analysis in Maude
-
N. Heintze, J. Wing (Eds.), Indianapolis, IN, 25 June
-
G. Denker, J. Meseguer, C. Talcott, Protocol specification and analysis in Maude, in: N. Heintze, J. Wing (Eds.), Proc. Workshop on Formal Methods and Security Protocols, Indianapolis, IN, 25 June 1998.
-
(1998)
Proc. Workshop on Formal Methods and Security Protocols
-
-
Denker, G.1
Meseguer, J.2
Talcott, C.3
-
20
-
-
84974577536
-
Information flow vs. resource access in the asynchronous pi-calculus
-
Proc. 27th Internat. Colloq. on Automata, Languages and Programming, Berlin: Springer
-
Hennessy M., Riely J. Information flow vs. resource access in the asynchronous pi-calculus. Proc. 27th Internat. Colloq. on Automata, Languages and Programming, Lecture Notes in Computer Science. 2000;415-427 Springer, Berlin.
-
(2000)
Lecture Notes in Computer Science
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
21
-
-
84947269249
-
Secure information flow as typed process behaviour
-
G. Smolka (Ed.), Programming Languages and Systems: Proc. 9th European Symp. on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), Berlin: Springer
-
Honda K., Vasconcelos V., Yoshida N. Secure information flow as typed process behaviour. Smolka G. Programming Languages and Systems: Proc. 9th European Symp. on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000). Lecture Notes in Computer Science. vol. 1782:2000;180-199 Springer, Berlin.
-
(2000)
Lecture Notes in Computer Science
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
22
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer R., Meadows C., Millen J. Three systems for cryptographic protocol analysis. J. Cryptol. 7(2):1994;79-130.
-
(1994)
J. Cryptol.
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
23
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems, Berlin: Springer
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. vol. 1055:1996;147-166 Springer, Berlin.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
25
-
-
85026563474
-
On asynchrony in name-passing calculi
-
Proc. 25th Internat. Colloq. on Automata, Languages and Programming, Berlin: Springer
-
Merro M., Sangiorgi D. On asynchrony in name-passing calculi. Proc. 25th Internat. Colloq. on Automata, Languages and Programming. Lecture Notes in Computer Science. vol. 1443:1998;856-867 Springer, Berlin.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 856-867
-
-
Merro, M.1
Sangiorgi, D.2
-
27
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
Milner R., Parrow J., Walker D. A calculus of mobile processes, parts I and II. Inform. and Comput. 100:1992;1-40, 41-77.
-
(1992)
Inform. and Comput.
, vol.100
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
30
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Commun. ACM. 21(12):1978;993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
31
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security. 6(1-2):1998;85-128.
-
(1998)
J. Comput. Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
34
-
-
84957588448
-
A semantic approach to secure information flow
-
Mathematics of Program Construction, 4th Internat. Conf., Berlin: Springer
-
Leino K.R.M., Joshi R. A semantic approach to secure information flow. Mathematics of Program Construction, 4th Internat. Conf. Lecture Notes in Computer Science. vol. 1422:1998;254-271 Springer, Berlin.
-
(1998)
Lecture Notes in Computer Science
, vol.1422
, pp. 254-271
-
-
Leino, K.R.M.1
Joshi, R.2
-
36
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
H. Ganzinger(Ed.), 16th Internat. Conf. on Automated Deduction (CADE-16), Berlin: Springer, July
-
Weidenbach C. Towards an automatic analysis of security protocols in first-order logic. Ganzinger H. 16th Internat. Conf. on Automated Deduction (CADE-16). Lecture Notes in Artificial Intelligence. vol. 1632:July 1999;314-328 Springer, Berlin.
-
(1999)
Lecture Notes in Artificial Intelligence
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|