-
1
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
[Abadi and Gordon 1998]
-
[Abadi and Gordon 1998] Abadi, M., Gordon, A. D.: "A bisimulation method for cryptographic protocols"; Nordic Journal of Computing, 5, 4 (1998), 267-303.
-
(1998)
Nordic Journal of Computing
, vol.5
, Issue.4
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0032597527
-
Proof techniques for cryptographic processes
-
[Boreale et al. 1999]
-
[Boreale et al. 1999] Boreale, M., De Nicola, R., Pugliese, R.: "Proof techniques for cryptographic processes"; Proc. Logic in Computer Science (1999), 157-166.
-
(1999)
Proc. Logic in Computer Science
, pp. 157-166
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
3
-
-
0347006666
-
Notes on algebraic calculi of processes
-
[Boudol 1985], NATO ASI Series F-13, Springer
-
[Boudol 1985] Boudol, G.: "Notes on algebraic calculi of processes": Proc. Logic and Models of Concurrent Systems, NATO ASI Series F-13, Springer (1985), 261-303.
-
(1985)
Proc. Logic and Models of Concurrent Systems
, pp. 261-303
-
-
Boudol, G.1
-
4
-
-
20144382038
-
Observational equivalence and trace equivalence in an extension of spi-calculus. Application to cryptographic protocols analysis
-
[Cortier 2002], Lab. Specification and Verification, ENS de Cachan, Cachan, France
-
[Cortier 2002] Cortier, V.: "Observational equivalence and trace equivalence in an extension of spi-calculus. application to cryptographic protocols analysis"; Technical Report LSV-02-3, Lab. Specification and Verification, ENS de Cachan, Cachan, France (2002).
-
(2002)
Technical Report
, vol.LSV-02-3
-
-
Cortier, V.1
-
5
-
-
0008723266
-
Distributed denial of service trin00, tribe flood network, tribe flood network 2000, and stacheldraht
-
[Criscuolo 2000], Lawrence Livermore National Laboratory (Feb)
-
[Criscuolo 2000] Criscuolo, P. J.: "Distributed denial of service trin00, tribe flood network, tribe flood network 2000, and stacheldraht"; Technical Report CIAC-2319, Lawrence Livermore National Laboratory (Feb 2000).
-
(2000)
Technical Report
, vol.CIAC-2319
-
-
Criscuolo, P.J.1
-
7
-
-
1242350159
-
Analyzing distributed denial of service tools: The shaft case
-
[Dietrich et al. 2000]
-
[Dietrich et al. 2000] Dietrich, S., Long, N., Dittrich, D.: "Analyzing distributed denial of service tools: The shaft case"; Proc. USENIX LISA (2000).
-
(2000)
Proc. USENIX LISA
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
8
-
-
0032659620
-
CVS: A compiler for the analysis of cryptographic protocols
-
[Durante et al. 1999], IEEE Computer Society (June)
-
[Durante et al. 1999] Durante, A., Focardi, R., Gorrieri, R.: "CVS: A compiler for the analysis of cryptographic protocols"; Proc. of 12th IEEE Computer Security Foundations Workshop, IEEE Computer Society (June 1999).
-
(1999)
Proc. of 12th IEEE Computer Security Foundations Workshop
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
9
-
-
0003313017
-
Using non interference for the analysis of security protocols
-
[Focardi et al. 1997], Orman, H., Meadows, C. (editors), Rutgers University (Sep)
-
[Focardi et al. 1997] Focardi, R., Ghelli, A., Gorrieri, R.: "Using non interference for the analysis of security protocols": Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, Orman, H., Meadows, C. (editors), Rutgers University (Sep 1997).
-
(1997)
Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Focardi, R.1
Ghelli, A.2
Gorrieri, R.3
-
10
-
-
84974776068
-
A classification of security properties for process algebras
-
[Focardi and Gorrieri 1994/1995]
-
[Focardi and Gorrieri 1994/1995] Focardi, R., Gorrieri, R.: "A classification of security properties for process algebras"; Journal of Computer Security, 3, 1 (1994/1995), 5-33.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
0003161603
-
Fail-stop protocols: An approach to designing secure protocols
-
[Gong and Syverson 1998], IEEE Computer Society
-
[Gong and Syverson 1998] Gong, L., Syverson, P.: "Fail-stop protocols: An approach to designing secure protocols"; Proc. Dependable Computing for Critical Applications, 5, IEEE Computer Society (1998), 79-100.
-
(1998)
Proc. Dependable Computing for Critical Applications
, vol.5
, pp. 79-100
-
-
Gong, L.1
Syverson, P.2
-
13
-
-
4944237116
-
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
-
[Lafrance and Mullins 2002a], Harland, J. (editor), Elsevier Science Publishers
-
[Lafrance and Mullins 2002a] Lafrance, S., Mullins, J.: "Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols"; Proc. Electronic Notes in Theoretical Computer Science, 61, Harland, J. (editor), Elsevier Science Publishers (2002).
-
(2002)
Proc. Electronic Notes in Theoretical Computer Science
, vol.61
-
-
Lafrance, S.1
Mullins, J.2
-
14
-
-
0041860183
-
A generic enemy process for the analysis of cryptoprotocols
-
[Lafrance and Mullins 2002b]
-
[Lafrance and Mullins 2002b] Lafrance, S., Mullins, J.: "A generic enemy process for the analysis of cryptoprotocols"; Proc. FSCBS'2002 (2002). Available at www.crac.polymtl.ca/mullins.
-
(2002)
Proc. FSCBS'2002
-
-
Lafrance, S.1
Mullins, J.2
-
15
-
-
84867442647
-
A symbolic approach to the analysis of security protocols
-
[Lafrance and Mullins 2003], Ottawa
-
[Lafrance and Mullins 2003] Lafrance, S., Mullins, J.: "A symbolic approach to the analysis of security protocols"; Proc. of Foundations of Computer Security affiliated with LICS'09, Ottawa (2003). Available at http://theory.stanford.edu/iliano/fcs03/www/
-
(2003)
Proc. of Foundations of Computer Security Affiliated with LICS'09
-
-
Lafrance, S.1
Mullins, J.2
-
16
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
[Meadows 1996]
-
[Meadows 1996] Meadows, C.: "The NRL protocol analyzer: An overview"; Journal of Logic Programming, 26, 2 (1996), 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0035075103
-
A cost-based framework for analysis of denial of service networks
-
[Meadows 2001]
-
[Meadows 2001] Meadows, C.: "A cost-based framework for analysis of denial of service networks"; Journal of Computer Security, 9, 1/2 (2001), 143-164.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
18
-
-
0026850008
-
A resource allocation model for denial of service
-
[Millen 1992], IEEE Computer Society Press
-
[Millen 1992] Millen, J.: "A resource allocation model for denial of service"; Proc. of the 1992 IEEE Symposium on Security and Privacy, IEEE Computer Society Press (1992), 137- 147.
-
(1992)
Proc. of the 1992 IEEE Symposium on Security and Privacy
, pp. 137-147
-
-
Millen, J.1
-
20
-
-
0042361083
-
Nondeterministic admissible interference
-
[Mullins 2000]
-
[Mullins 2000] Mullins, J.: "Nondeterministic admissible interference"; Journal of Universal Computer Science, 6, 11 (2000), 1054-1070.
-
(2000)
Journal of Universal Computer Science
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
23
-
-
0003502331
-
Noninterference, transitivity and channel-control security policies
-
[Rushby 1992], SRI International, Menlo Park CA, USA (Dec)
-
[Rushby 1992] Rushby, J.: "Noninterference, transitivity and channel-control security policies"; Technical Report CSL-92-02, SRI International, Menlo Park CA, USA (Dec 1992).
-
(1992)
Technical Report
, vol.CSL-92-02
-
-
Rushby, J.1
-
25
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
[Schuba et al. 1997], IEEE Computer Society Press (May)
-
[Schuba et al. 1997] Schuba, C. L., Krsul, I. V., Kuhn, M. G., Spafford, E. H., Sundaram, A., Zamboni, D.: "Analysis of a denial of service attack on TCP"; Proc. of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press (May 1997), 208-223.
-
(1997)
Proc. of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
26
-
-
0023829320
-
A formal specification and verification method for the prevention of denial of service
-
[Yu and Gligor 1988], IEEE Computer Society Press (Apr)
-
[Yu and Gligor 1988] Yu, C., Gligor, V. D.: "A formal specification and verification method for the prevention of denial of service"; Proc. 1988 IEEE Symposium on Security and Privacy, 117, IEEE Computer Society Press (Apr 1988), 187-202.
-
(1988)
Proc. 1988 IEEE Symposium on Security and Privacy
, vol.117
, pp. 187-202
-
-
Yu, C.1
Gligor, V.D.2
|