-
1
-
-
35048841165
-
Abstraction-driven SAT-based Analysis of Security Protocols
-
LNCS 2919. Springer-Verlag
-
A. Armando, and L. Compagna Abstraction-driven SAT-based Analysis of Security Protocols Proc. SAT 2003 LNCS 2919 2003 Springer-Verlag http://www.avispa-project.org
-
(2003)
Proc. SAT 2003
-
-
Armando, A.1
Compagna, L.2
-
2
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
LNCS 2808. Springer-Verlag
-
D. Basin, S. Mödersheim, and L. Viganò An On-The-Fly Model-Checker for Security Protocol Analysis Proc. ESORICS'03 LNCS 2808 2003 Springer-Verlag http://www.avispa-project.org
-
(2003)
Proc. ESORICS'03
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
4
-
-
84867214800
-
Towards a metalogic for security protocol analysis (extended abstract)
-
C. Caleiro, L. Viganò, and D. Basin. Towards a Metalogic for Security Protocol Analysis (extended abstract). In Proc. Comblog'04, 2004
-
(2004)
Proc. Comblog'04
-
-
Caleiro, C.1
Viganò, L.2
Basin, D.3
-
5
-
-
0041498629
-
Automated Unbounded Verification of Security Protocols
-
LNCS 2404. Springer-Verlag
-
Y. Chevalier, and L. Vigneron Automated Unbounded Verification of Security Protocols Proc. CAV'02 LNCS 2404 2002 Springer-Verlag http://www.avispa-project.org
-
(2002)
Proc. CAV'02
-
-
Chevalier, Y.1
Vigneron, L.2
-
6
-
-
14044275023
-
Security properties: Two agents are sufficient
-
LNCS 2618. Springer-Verlag
-
H. Comon-Lundh, and V. Cortier Security properties: two agents are sufficient Proc. ESOP'2003 LNCS 2618 2003 Springer-Verlag
-
(2003)
Proc. ESOP'2003
-
-
Comon-Lundh, H.1
Cortier, V.2
-
7
-
-
0034829261
-
Proving secrecy is easy enough
-
IEEE Computer Society
-
V. Cortier, J. Millen, and H. Rueß Proving secrecy is easy enough Proc. CSFW'01 2001 IEEE Computer Society
-
(2001)
Proc. CSFW'01
-
-
Cortier, V.1
Millen, J.2
Rueß, H.3
-
9
-
-
0034144974
-
Specifying communication in distributed information systems
-
H.-D. Ehrich, and C. Caleiro Specifying communication in distributed information systems Acta Informatica 36 2000 591 616
-
(2000)
Acta Informatica
, vol.36
, pp. 591-616
-
-
Ehrich, H.-D.1
Caleiro, C.2
-
10
-
-
0342658605
-
Breaking and Fixing the Needham-Shroeder Public-Key Protocol Using FDR
-
LNCS 1055. Springer-Verlag
-
G. Lowe Breaking and Fixing the Needham-Shroeder Public-Key Protocol Using FDR Proc. TACAS'96 LNCS 1055 1996 Springer-Verlag
-
(1996)
Proc. TACAS'96
-
-
Lowe, G.1
-
11
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press
-
G. Lowe A hierarchy of authentication specifications Proc. CSFW'97 1997 IEEE Computer Society Press
-
(1997)
Proc. CSFW'97
-
-
Lowe, G.1
-
13
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
J. Millen, and V. Shmatikov Constraint solving for bounded-process cryptographic protocol analysis Proc. CCS'01 2001 ACM Press
-
(2001)
Proc. CCS'01
-
-
Millen, J.1
Shmatikov, V.2
-
14
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson The inductive approach to verifying cryptographic protocols Journal of Computer Security 6 1998 85 128
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
16
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin, and A. Perrig Athena: a novel approach to efficient automatic security protocol analysis Journal of Computer Security 9 2001 47 74
-
(2001)
Journal of Computer Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
|