-
1
-
-
35248843428
-
On compositional reasoning in the Spi-calculus
-
Proc. FOSSACS'02, Springer, Berlin
-
M. Boreale, D. Gorla, On compositional reasoning in the Spi-calculus, in: Proc. FOSSACS'02, Lecture Notes in Computer Science, Vol. 2303, Springer, Berlin, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2303
-
-
Boreale, M.1
Gorla, D.2
-
2
-
-
84957023134
-
Analysing a stream authentication protocol using model checking
-
Proc. ESORICS'02, Springer, Berlin
-
P. Broadfoot, G. Lowe, Analysing a stream authentication protocol using model checking, in: Proc. ESORICS'02, Lecture Notes in Computer Science, Vol. 2502, Springer, Berlin, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2502
-
-
Broadfoot, P.1
Lowe, G.2
-
4
-
-
0038675422
-
Authenticity in a reliable protocol for mobile computing
-
ACM Press, New York, March
-
N. De Francesco, M. Petrocchi, Authenticity in a reliable protocol for mobile computing, in: Proc. 18th ACM SAC, ACM Press, New York, March 2003.
-
(2003)
Proc. 18th ACM SAC
-
-
De Francesco, N.1
Petrocchi, M.2
-
5
-
-
84974776068
-
A classification of security properties
-
Focardi R., Gorrieri R. A classification of security properties. J. Comput. Security. 3(1):1995;5-33.
-
(1995)
J. Comput. Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
84974597207
-
Non-interference for the analysis of cryptographic protocols
-
Proc. ICALP'00, Springer, Berlin
-
R. Focardi, R. Gorrieri, F. Martinelli, Non-interference for the analysis of cryptographic protocols, in: Proc. ICALP'00, Lecture Notes in Computer Science, Vol. 1853, Springer, Berlin, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
10
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proc. FM'99, Springer, Berlin
-
R. Focardi, F. Martinelli, A uniform approach for the definition of security properties, in: Proc. FM'99, Lecture Notes in Computer Science, Vol. 1708, Springer, Berlin, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1708
-
-
Focardi, R.1
Martinelli, F.2
-
11
-
-
0035946056
-
How to sign digital streams
-
Gennaro R., Rohatgi P. How to sign digital streams. Inform. Comput. 165(1):2001;100-116.
-
(2001)
Inform. Comput.
, vol.165
, Issue.1
, pp. 100-116
-
-
Gennaro, R.1
Rohatgi, P.2
-
12
-
-
35248873844
-
A simple language for real-time cryptographic protocol analysis
-
Proc. ESOP'03, Warsaw
-
R. Gorrieri, E. Locatelli, F. Martinelli, A simple language for real-time cryptographic protocol analysis, in: Proc. ESOP'03, Lecture Notes in Computer Science, Vol. 2618, Warsaw, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2618
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
13
-
-
1442316809
-
Using compositional reasoning and non-interference for verifying integrity in digital stream protocols
-
IEEE Press, Lisbon
-
R. Gorrieri, F. Martinelli, M. Petrocchi, A. Vaccarelli, Using compositional reasoning and non-interference for verifying integrity in digital stream protocols, in: Proc. ACSD'03, IEEE Press, Lisbon, 2003.
-
(2003)
Proc. ACSD'03
-
-
Gorrieri, R.1
Martinelli, F.2
Petrocchi, M.3
Vaccarelli, A.4
-
14
-
-
0345412612
-
Formal analysis of some security properties in wireless/sensor protocols
-
Proc. FMOODS'03, Paris
-
R. Gorrieri, F. Martinelli, M. Petrocchi, A. Vaccarelli, Formal analysis of some security properties in wireless/sensor protocols, in: Proc. FMOODS'03, Lecture Notes in Computer Science, Vol. 2884, Paris, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2884
-
-
Gorrieri, R.1
Martinelli, F.2
Petrocchi, M.3
Vaccarelli, A.4
-
15
-
-
0027666919
-
Transition system specifications with negative premises
-
Groote J.F. Transition system specifications with negative premises. Theoret. Comput. Sci. 118:1993;263-299.
-
(1993)
Theoret. Comput. Sci.
, vol.118
, pp. 263-299
-
-
Groote, J.F.1
-
16
-
-
0033714403
-
Protocol independence through disjoint encryption
-
IEEE Press, New York
-
J. Guttman, F.J. Thayer, Protocol independence through disjoint encryption, in: Proc. CSFW'00, IEEE Press, New York, 2000.
-
(2000)
Proc. CSFW'00
-
-
Guttman, J.1
Thayer, F.J.2
-
17
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Press, New York
-
G. Lowe, A hierarchy of authentication specifications, in: Proc. CSFW'97, IEEE Press, New York, 1997.
-
(1997)
Proc. CSFW'97
-
-
Lowe, G.1
-
18
-
-
0142187681
-
Compositional verification of secure streaming data: A case study with EMSS
-
Proc. ICTCS'03, Springer, Berlin
-
F. Martinelli, M. Petrocchi, A. Vaccarelli, Compositional verification of secure streaming data: a case study with EMSS, in: Proc. ICTCS'03, Lecture Notes in Computer Science, Vol. 2841, Springer, Berlin, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2841
-
-
Martinelli, F.1
Petrocchi, M.2
Vaccarelli, A.3
-
20
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
IEEE Press, New York
-
A. Perrig, R. Canetti, J.D. Tygar, D.X. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proc. IEEE S & P'00, IEEE Press, New York, 2000.
-
(2000)
Proc. IEEE S & P'00
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.X.4
-
21
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar J.D., Wen V., Culler D. SPINS. security protocols for sensor networks Wireless Networks J. 8:2002;521-534.
-
(2002)
Wireless Networks J.
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.5
-
23
-
-
84944070422
-
Analysing time-dependent security properties in CSP using PVS
-
Proc. ESORICS, Springer, Berlin
-
S. Schneider, Analysing time-dependent security properties in CSP using PVS, in: Proc. ESORICS, Lecture Notes in Computer Science, Vol. 1895, Springer, Berlin, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
-
-
Schneider, S.1
-
24
-
-
84947938368
-
Extending process languages with time
-
Proc. AMAST, Springer, Berlin
-
I. Ulidowski, S. Yuen, Extending process languages with time, in: Proc. AMAST, Lecture Notes in Computer Science, Vol. 1349, Springer, Berlin, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1349
-
-
Ulidowski, I.1
Yuen, S.2
|