-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Expanded version available as SRC Research Report 149 (January 1998)
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus, Information and Computation 148(1) (1999), 1-70. Expanded version available as SRC Research Report 149 (January 1998).
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
3
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, in: Proceedings of the Royal Society, Series A 426(1871) (1989), 233-271. Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8(1) (1990), 18-36.
-
(1989)
Proceedings of the Royal Society, Series A
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0003185332
-
SRC Research Report 39 and, in a shortened form
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, in: Proceedings of the Royal Society, Series A 426(1871) (1989), 233-271. Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8(1) (1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
-
5
-
-
0032671775
-
A meta-notation for protocol analysis
-
P. Syverson. ed., IEEE Computer Society Press
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell and A. Scedrov, A meta-notation for protocol analysis, in: 12-th IEEE Computer Security Foundations Workshop, P. Syverson. ed., IEEE Computer Society Press, 1999.
-
(1999)
12-th IEEE Computer Security Foundations Workshop
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
7
-
-
84877781491
-
Composing strand spaces
-
FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 22nd Conference Kanpur, India, M. Agrawal and A. Seth, eds
-
F. Crazzolara and G. Winskel, Composing strand spaces, in: FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 22nd Conference Kanpur, India, M. Agrawal and A. Seth, eds, Proceedings, Volume 2556 of Lecture Notes in Computer Science, Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2556
-
-
Crazzolara, F.1
Winskel, G.2
-
9
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland. CA, IEEE Computer Society Press
-
F.J.T. Fábrega, J.C. Herzog and J.D. Guttman, Strand spaces: Why is a security protocol correct? in: Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland. CA, IEEE Computer Society Press, 1998, pp. 160-171.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
10
-
-
0002780749
-
Assigning meaning to programs
-
J.T. Schwanz, ed., Providence RI, American Mathematical Society
-
R.W. Floyd, Assigning meaning to programs, in: Mathematical aspects of computer science: Proc. American Mathematics Soc. Symposia, J.T. Schwanz, ed., Volume 19, Providence RI, American Mathematical Society, 1967, pp. 19-31.
-
(1967)
Mathematical Aspects of Computer Science: Proc. American Mathematics Soc. Symposia
, vol.19
, pp. 19-31
-
-
Floyd, R.W.1
-
11
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
D. Cooper and T. Lunt, eds, IEEE Computer Society
-
L. Gong, R. Needham and R. Yahalom, Reasoning about belief in cryptographic protocols, in: Proceedings 1990 IEEE Symposium on Research in Security and Privacy, D. Cooper and T. Lunt, eds, IEEE Computer Society. 1990, pp. 234-248.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
12
-
-
84945708698
-
An axiomatic basis for computer programming
-
C.A.R. Hoare, An axiomatic basis for computer programming, Communications of the ACM 12(10) (1969), 576-580.
-
(1969)
Communications of the ACM
, vol.12
, Issue.10
, pp. 576-580
-
-
Hoare, C.A.R.1
-
13
-
-
0002798893
-
A compositional protocol verification using relativized bisimulation
-
K.G. Larsen and R. Milner, A compositional protocol verification using relativized bisimulation, Information and Computation 99 (1992).
-
(1992)
Information and Computation
, vol.99
-
-
Larsen, K.G.1
Milner, R.2
-
14
-
-
28144456308
-
An attack on the Needham-Schroeder public-key protocol
-
G. Lowe, An attack on the Needham-Schroeder public-key protocol, Info. Proc. Letters 56 (1995), 131-133.
-
(1995)
Info. Proc. Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
16
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows, The NRL protocol analyzer: an overview, J. Logic Programming 26(2) (1996), 113-131.
-
(1996)
J. Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0141546693
-
Action structures
-
Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December
-
R. Milner, Action structures, LFCS report ECS-LFCS-92-249, Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December 1992.
-
(1992)
LFCS Report
, vol.ECS-LFCS-92-249
-
-
Milner, R.1
-
19
-
-
85013592213
-
Action calculi, or syntactic action structures
-
Springer
-
R. Milner, Action calculi, or syntactic action structures, in: Mathematical Foundations of Computer Science 1993, 18th International Symposium, MFCS '93, Springer, 1993, pp. 105-121.
-
(1993)
Mathematical Foundations of Computer Science 1993, 18th International Symposium, MFCS '93
, pp. 105-121
-
-
Milner, R.1
-
21
-
-
44049113210
-
A calculus of mobile processes, part i
-
R. Milner, J. Parrow and D. Walker, A calculus of mobile processes, part i, Information and Computation 100(1) (1992), 1-40.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
23
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
25
-
-
85013569711
-
Categorical logic of names and abstraction in action calculi
-
D. Pavlovic, Categorical logic of names and abstraction in action calculi, Math. Structures in Comp. Sci. 7(6) (1997), 619-637.
-
(1997)
Math. Structures in Comp. Sci.
, vol.7
, Issue.6
, pp. 619-637
-
-
Pavlovic, D.1
-
26
-
-
0029484376
-
Modelling and verifying key-exchange protocols using CSP and FDR
-
IEEE Computer Soc. Press
-
A.W. Roscoe, Modelling and verifying key-exchange protocols using CSP and FDR, in: 8th IEEE Computer Security Foundations Workshop. IEEE Computer Soc. Press, 1995, pp. 98-107.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 98-107
-
-
Roscoe, A.W.1
|