-
1
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Springer
-
R. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. Concur’00, LNCS 1877, pp. 380–394. Springer, 2000.
-
(2000)
Proc. Concur’00, LNCS
, vol.1877
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
2
-
-
85165862416
-
-
Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252
-
AVISPA: Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252, www.avispa-project.org.
-
-
-
AVISPA1
-
3
-
-
85165847085
-
-
Term Rewriting and All That. Cambridge U. Pr
-
F. Baader and T. Nipkow. Term Rewriting and All That. Cambridge U. Pr., 1998.
-
(1998)
-
-
Baader, F.1
Nipkow, T.2
-
4
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
Springer
-
D. Basin. Lazy infinite-state analysis of security protocols. In Proc. CQRE’99, LNCS 1740, pp. 30–42. Springer, 1999.
-
(1999)
Proc. CQRE’99, LNCS
, vol.1740
, pp. 30-42
-
-
Basin, D.1
-
5
-
-
85165856764
-
-
An On-The-Fly Model-Checker for Security Protocol Analysis (Extended Version). Technical Report 404, ETH Zurich, Computer Science
-
D. Basin, S. Mödersheim, and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis (Extended Version). Technical Report 404, ETH Zurich, Computer Science, 2003. http://www.inf.ethz.ch/research/publications/.
-
(2003)
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
6
-
-
12344277212
-
-
Technical Report 405, ETH Zurich, Computer Science
-
D. Basin, S. Mödersheim, and L. Viganò. Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. Technical Report 405, ETH Zurich, Computer Science, 2003. http://www.inf.ethz.ch/research/publications/.
-
(2003)
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
7
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Springer
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. ICALP’01, LNCS 2076, pp. 667–681. Springer, 2001.
-
(2001)
Proc. ICALP’01, LNCS
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
8
-
-
84944686372
-
A Tool for Lazy Verification of Security Protocols
-
IEEE Computer Society Press
-
Y. Chevalier and L. Vigneron. A Tool for Lazy Verification of Security Protocols. In Proc. ASE’01. IEEE Computer Society Press, 2001.
-
(2001)
Proc. ASE’01
-
-
Chevalier, Y.1
Vigneron, L.2
-
9
-
-
85165855139
-
-
A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov
-
J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL: www.cs.york.ac.uk/~jac/papers/drareview.ps.gz.
-
(1997)
-
-
Clark, J.1
Jacob, J.2
-
10
-
-
84958742278
-
An Improved Constraint-Based System for the Verification of Security Protocols
-
Springer
-
R. Corin and S. Etalle. An Improved Constraint-Based System for the Verification of Security Protocols. In Proc. SAS 2002, LNCS 2477, pp. 326–341. Springer, 2002.
-
(2002)
Proc. SAS 2002, LNCS
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
16
-
-
0034829105
-
Computing Symbolic Models for Verifying Cryptographic Protocols
-
IEEE Computer Society Press
-
M. Fiore and M. Abadi. Computing Symbolic Models for Verifying Cryptographic Protocols. In Proc. CSFW’01. IEEE Computer Society Press, 2001.
-
(2001)
Proc. CSFW’01
-
-
Fiore, M.1
Abadi, M.2
-
18
-
-
85165845167
-
-
Symmetric Security Procedures for H.510 (Mobility for H.323 Multimedia Systems and Services)
-
ITU-T Recommendation H.530: Symmetric Security Procedures for H.510 (Mobility for H.323 Multimedia Systems and Services). 2002.
-
(2002)
-
-
-
19
-
-
84956860311
-
Compiling and Verifying Security Protocols
-
Springer
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In Proc. LPAR 2000, LNCS 1955, pp. 131–160. Springer, 2000.
-
(2000)
Proc. LPAR 2000, LNCS
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
20
-
-
0031633395
-
Casper: A Compiler for the Analysis of Security Protocols
-
G. Lowe. Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6(1):53–84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
22
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. CCS’01, pp. 166–175, ACM Press, 2001.
-
(2001)
Proc. CCS’01
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
24
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1):85–128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.C.1
-
25
-
-
0003777431
-
-
Addison Wesley
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. Modelling and Analysis of Security Protocols. Addison Wesley, 2000.
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
26
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9:47–74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
|