-
2
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao model
-
Brim L, Jancar P, Kretinsky M, Kucera A (eds) Springer, Berlin Heidelberg New York
-
Amadio RM, Charatonik W (2002) On name generation and set-based analysis in the Dolev-Yao model. In: Brim L, Jancar P, Kretinsky M, Kucera A (eds) 13th international conference on concurrency theory (CONCUR 2002). Springer, Berlin Heidelberg New York, 2421:499-514
-
(2002)
13th International Conference on Concurrency Theory (CONCUR 2002)
, vol.2421
, pp. 499-514
-
-
Amadio, R.M.1
Charatonik, W.2
-
3
-
-
4244001452
-
On the symbolic reduction of processes with cryptographic functions
-
Technical Report RR-4147, INRIA
-
Amadio RM, Lugiez D, Vanackère V (2001) On the symbolic reduction of processes with cryptographic functions. Technical Report RR-4147, INRIA
-
(2001)
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackère, V.3
-
4
-
-
84937567009
-
The AVISS security protocol analysis tool
-
Brinksma E, Larsen KG (eds) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Armando A, Basin D, Bouallagui M, Chevalier Y, Compagna L, Mödersheim S, Rusinowitch M, Turuani M, Viganò L, Vigneron L (2002) The AVISS security protocol analysis tool. In: Brinksma E, Larsen KG (eds) 14th international conference on computer aided verification (CAV 2002). Lecture notes in computer science, vol 2404. Springer, Berlin Heidelberg New York, pp 349-353
-
(2002)
14th International Conference on Computer Aided Verification (CAV 2002)
, vol.2404
, pp. 349-353
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
5
-
-
0032218234
-
Authenticated group key agreement and friends
-
San Francisco. ACM Press, New York
-
Ateniese G, Steiner M, Tsudik G (1998) Authenticated group key agreement and friends. In: Proceedings of the 5th ACM conference on computer and communication security (CCS'98), San Francisco. ACM Press, New York, pp 17-26
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communication Security (CCS'98)
, pp. 17-26
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson D (ed) 13th Annual International Cryptology Conference. Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Bellare M, Rogaway P (1994) Entity authentication and key distribution. In: Stinson D (ed) Advances in Cryptology - Crypto '93, 13th annual international cryptology conference. Lecture notes in computer science, vol 773. Springer, Berlin Heidelberg New York
-
(1994)
Advances in Cryptology - Crypto '93
, vol.773
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
28th International Colloquium (ICALP 2001). Lecture notes in computer science. Springer, Berlin Heidelberg New York
-
Boreale M (2001) Symbolic trace analysis of cryptographic protocols. In: Automata, languages and programming, 28th international colloquium (ICALP 2001). Lecture notes in computer science, vol 2076. Springer, Berlin Heidelberg New York, pp 667-681
-
(2001)
Automata, Languages and Programming
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
11
-
-
14044264137
-
The authentication protocol
-
Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK
-
Bull JA, Otway DJ (1997) The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK
-
(1997)
-
-
Bull, J.A.1
Otway, D.J.2
-
14
-
-
0003568551
-
A survey of authentication protocol literature
-
available at
-
Clark J, Jacob J (1997) A survey of authentication protocol literature. Web Draft Version 1.0 available at http://citeseer.nj.nec.com/
-
(1997)
Web Draft Version 1.0
-
-
Clark, J.1
Jacob, J.2
-
15
-
-
0033718532
-
TAPS: First-order verification of cryptographic protocols
-
IEEE Press, New York, (2002) Goubault-Larrecq J (ed) J. Telecommun. Inf. Technol. 4:5-15
-
Cohen E (2000) TAPS: First-order verification of cryptographic protocols. In: 13th Computer Security Foundations Workshop (CSFW 2000). IEEE Press, New York, pp 144-158 (2002) Goubault-Larrecq J (ed) J Telecommun Inf Technol 4:5-15
-
(2000)
13th Computer Security Foundations Workshop (CSFW 2000)
, pp. 144-158
-
-
Cohen, E.1
-
17
-
-
0020190170
-
On the security of ping-pong protocols
-
Dolev D, Even S, Karp RM (1982) On the security of ping-pong protocols. Inf Control 55:57-68
-
(1982)
Inf. Control
, vol.55
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.M.3
-
18
-
-
0020720357
-
On the security of public-key protocols
-
Dolev D, Yao AC (1983) On the security of public-key protocols. IEEE Trans Inf Theory 29(2):198-208
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
22
-
-
0005240447
-
A cryptographic evaluation of IPsec
-
Technical report
-
Ferguson N, Schneier B (2000) A cryptographic evaluation of IPsec. Technical report. http://www.counterpane.com/ipsec.pdf
-
(2000)
-
-
Ferguson, N.1
Schneier, B.2
-
23
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
IEEE Press, New York
-
Fiore MP, Abadi M (2001) Computing symbolic models for verifying cryptographic protocols. In: 14th Computer Security Foundations Workshop (CSFW-14). IEEE Press, New York, pp 160-173
-
(2001)
14th Computer Security Foundations Workshop (CSFW-14)
, pp. 160-173
-
-
Fiore, M.P.1
Abadi, M.2
-
25
-
-
0003603813
-
Computers and intractability: A guide to the theory of NP-completeness
-
Freeman, San Francisco
-
Garey MR, Johnson DS (1979) Computers and intractability: A guide to the theory of NP-completeness. Freeman, San Francisco
-
(1979)
-
-
Garey, M.R.1
Johnson, D.S.2
-
28
-
-
0002548429
-
The evolution of the Kerberos authentication service
-
Brazier F, Johansen D (eds) IEEE Press, New York
-
Kohl J, Neuman B, Ts'o T (1994) The evolution of the Kerberos authentication service. In: Brazier F, Johansen D (eds) Distributed open systems. IEEE Press, New York
-
(1994)
Distributed Open Systems
-
-
Kohl, J.1
Neuman, B.2
Ts'o, T.3
-
29
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe G (1995) An attack on the Needham-Schroeder public-key authentication protocol. Inf Process Lett 56:131-133
-
(1995)
Inf. Process Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
30
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Tools and algorithms for the construction and analysis of systems (TACAS 1996). Lecture notes in computer science, vol 1055. Springer, Berlin Heidelberg New York, pp 147-166
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS 1996)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
31
-
-
0012795935
-
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
-
Degano P (ed)
-
Meadows C (2000) Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In: Degano P (ed) Proceedings of the 1st workshop on issues in the theory of security (WITS'00), pp 87-92
-
(2000)
Proceedings of the 1st Workshop on Issues in the Theory of Security (WITS'00)
, pp. 87-92
-
-
Meadows, C.1
-
32
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Press, New York
-
Meadows C (2000) Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of DISCEX 2000. IEEE Press, New York, pp 237-250
-
(2000)
Proceedings of DISCEX 2000
, pp. 237-250
-
-
Meadows, C.1
-
35
-
-
0023247970
-
Efficient and timely mutual authentication
-
Otway D, Rees O (1987) Efficient and timely mutual authentication. Oper Syst Rev 21(1):8-10
-
(1987)
Oper. Syst. Rev.
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
37
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE Press, New York
-
Paulson LC (1997) Proving properties of security protocols by induction. In: 10th Computer Security Foundations Workshop (CSFW-10). IEEE Press, New York, pp 70-83
-
(1997)
10th Computer Security Foundations Workshop (CSFW-10)
, pp. 70-83
-
-
Paulson, L.C.1
-
41
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
Song DX, Berezin S, Perrig A (2001) Athena: A novel approach to efficient automatic security protocol analysis. J Comput Secur 9(1/ 2):47-74
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
-
43
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
Zhou J (1999) Fixing a security flaw in IKE protocols. Electron Lett 35(13):1072-1073
-
(1999)
Electron. Lett.
, vol.35
, Issue.13
, pp. 1072-1073
-
-
Zhou, J.1
|