-
2
-
-
84957872542
-
Reasoning about cryptographic protocols in the Spi calculus
-
Berlin: Springer
-
Abadi M., Gordon A.D. Reasoning about cryptographic protocols in the Spi calculus, in: CONCUR'97: Concurrency Theory, vol. 1243:1997;Springer, Berlin. pp. 59-73.
-
(1997)
CONCUR'97: Concurrency Theory
, vol.1243
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The Spi calculus
-
Abadi M., Gordon A.D. A calculus for cryptographic protocols: The Spi calculus. Information and Computation. 148:(1):1999;1-70.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
0347006666
-
Notes on algebraic calculi of processes
-
Logic and Models of Concurrent Systems, Berlin: Springer
-
Boudol G. Notes on algebraic calculi of processes, in: Logic and Models of Concurrent Systems, NATO ASI Series F-13. 1985;Springer, Berlin. pp. 261-303.
-
(1985)
NATO ASI Series
, vol.F-13
, pp. 261-303
-
-
Boudol, G.1
-
10
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3:(1):1994/1995;5-33.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proceedings of World Congress on Formal Methods (FM'99), Berlin: Springer
-
Focardi R., Martinelli F. A uniform approach for the definition of security properties, in: Proceedings of World Congress on Formal Methods (FM'99), LNCS. vol. 1708:1999;Springer, Berlin.
-
(1999)
LNCS
, vol.1708
-
-
Focardi, R.1
Martinelli, F.2
-
14
-
-
0025432462
-
Ccs expressions, finite state processes and three problems of equivalence
-
Kannellakis P., Smolka S. Ccs expressions, finite state processes and three problems of equivalence. Information and Computation. 86:1990;333-354.
-
(1990)
Information and Computation
, vol.86
, pp. 333-354
-
-
Kannellakis, P.1
Smolka, S.2
-
15
-
-
0041860183
-
A generic enemy process for the analysis of cryptoprotocols
-
S. Lafrance, J. Mullins, A generic enemy process for the analysis of cryptoprotocols, 2002, Presented at FSCBS'2002. Available at www.crac.polymtl. ca .
-
(2002)
FSCBS'2002
-
-
Lafrance, S.1
Mullins, J.2
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceedings of TACAS'96, Berlin: Springer
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proceedings of TACAS'96, LNCS. vol. 1055:1996;Springer, Berlin, pp. 147-166.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
0003307796
-
Security models
-
J. Marciniak. New York: Wiley
-
McLean J. Security models. Marciniak J. Encyclopedia of Software Engineering. 1994;1136-1145 Wiley, New York.
-
(1994)
Encyclopedia of Software Engineering
, pp. 1136-1145
-
-
McLean, J.1
-
19
-
-
0042361083
-
Nondeterministic admissible interference
-
Mullins J. Nondeterministic admissible interference. Journal of Universal Computer Science. 6:(11):2000;1054-1070.
-
(2000)
Journal of Universal Computer Science
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
20
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
Oakland, CA, IEEE Computer Society, May
-
Pinsky S. Absorbing covers and intransitive non-interference, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA. in: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA. May 1995;IEEE Computer Society. pp. 102-113.
-
(1995)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
21
-
-
0029484376
-
Modelling and verifying key-exchange using CSP and FDR
-
IEEE Computer Society Press
-
Roscoe A.W. Modelling and verifying key-exchange using CSP and FDR, in: Eighth Computer Security Foundation Workshop. 1995;IEEE Computer Society Press.
-
(1995)
Eighth Computer Security Foundation Workshop
-
-
Roscoe, A.W.1
-
23
-
-
0026630927
-
Authentication for distributed systems
-
Woo T., Lam S. Authentication for distributed systems. IEEE Computer. 25:(1):1992;39-52.
-
(1992)
IEEE Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.1
Lam, S.2
|