-
1
-
-
35248848311
-
Computer-assisted verification of a protocol for certified email
-
Cousot R (ed) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Abadi M, Blanchet B (2003) Computer-assisted verification of a protocol for certified email. In: Cousot R (ed) Proc. 10th international symposium on static analysis (SAS'03), Lecture notes in computer science, vol 2694. Springer, Berlin Heidelberg New York, pp 316-335
-
(2003)
Proc. 10th International Symposium on Static Analysis (SAS'03)
, vol.2694
, pp. 316-335
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0028532579
-
Why cryptosystems fail
-
Anderson R (1994) Why cryptosystems fail. Commun ACM 37(11):32-40
-
(1994)
Commun. ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.1
-
3
-
-
84937567009
-
The AVISS Security Protocol Analysis Tool
-
Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Armando A, Basin D, Bouallagui M, Chevalier Y, Compagna L, Mödersheim S, Rusinowitch M, Turuani M, Viganò L, Vigneron L (2002) The AVISS Security Protocol Analysis Tool. In: Proc. international conference on computer-aided verification (CAV-02). Lecture notes in computer science, vol 2404. Springer, Berlin Heidelberg New York
-
(2002)
Proc. International Conference on Computer-Aided Verification (CAV-02)
, vol.2404
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
4
-
-
14844316096
-
SAT-based model-checking of security protocols
-
Pisa, Italy, 8-14 September 2003
-
Armando A, Compagna L, Ganty P (2003) SAT-based model-checking of security protocols. In: Proc. 12th international FME symposium (FME03), Pisa, Italy, 8-14 September 2003
-
(2003)
Proc. 12th International FME Symposium (FME03)
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
5
-
-
0030646696
-
Optimistic protocols for fair exchange
-
ACM Press/Addison-Wesley, Reading, MA
-
Asokan N, Schunter M, Waidner M (1997) Optimistic protocols for fair exchange. In: Proc. 4th ACM conference on computer and communication security (CCS-97). ACM Press/Addison-Wesley, Reading, MA, pp 7-17
-
(1997)
Proc. 4th ACM Conference on Computer and Communication Security (CCS-97)
, pp. 7-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
7
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
Baumgart R (ed) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Basin D (1999) Lazy infinite-state analysis of security protocols. In: Baumgart R (ed) Secure networking - CQRE (Secure)'99, Lecture notes in computer science, vol 1740. Springer, Berlin Heidelberg New York, pp 30-42
-
(1999)
Secure Networking - CQRE (Secure)'99
, vol.1740
, pp. 30-42
-
-
Basin, D.1
-
8
-
-
0009956081
-
Maude versus Haskell: An experimental comparison in security protocol analysis
-
Futatsugi K. (ed) Elsevier (North-Holland), Amsterdam
-
Basin D, Denker G (2001) Maude versus Haskell: An experimental comparison in security protocol analysis. In: Futatsugi K (ed) Electronic notes in theoretical computer science, vol 36. Elsevier (North-Holland), Amsterdam
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.36
-
-
Basin, D.1
Denker, G.2
-
9
-
-
0037237984
-
Inductive verification of smart card protocols
-
Bella G (2003) Inductive verification of smart card protocols. J Comput Secur 11(1):87-132
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.1
, pp. 87-132
-
-
Bella, G.1
-
10
-
-
84949979013
-
Making sense of specifications: The formalization of set (extended abstract)
-
Christianson B, Crispo B, Malcolm JA, Roe M (eds) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Bella G, Massacci F, Paulson L, Tramontano P (2000) Making sense of specifications: The formalization of set (extended abstract). In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 2000 workshop on security protocols. Lecture notes in computer science, vol 2133. Springer, Berlin Heidelberg New York, pp 74-81
-
(2000)
Proceedings of the 2000 Workshop on Security Protocols
, vol.2133
, pp. 74-81
-
-
Bella, G.1
Massacci, F.2
Paulson, L.3
Tramontano, P.4
-
11
-
-
0038011251
-
The verification of an industrial payment protocol: The SET purchase phase
-
Atluri V (ed), ACM Press, New York
-
Bella G, Massacci F, Paulson LC (2002) The verification of an industrial payment protocol: The SET purchase phase. In: Atluri V (ed) Proc. 9th ACM conference on computer and communications security. ACM Press, New York, pp 12-20
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security
, pp. 12-20
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
13
-
-
84944035753
-
Formal verification of cardholder registration in SET
-
Cuppens F, Deswarte Y, Gollman D, Waidner M (eds) Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Bella G, Massacci F, Paulson LC, Tramontano P (2000) Formal verification of cardholder registration in SET. In: Cuppens F, Deswarte Y, Gollman D, Waidner M (eds) Computer Security - ESORICS 2000. Lecture notes in computer science, vol 1895. Springer, Berlin Heidelberg New York, pp 159-174
-
(2000)
Computer Security - ESORICS 2000
, vol.1895
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
14
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
Quisquater et al. [37]
-
Bella G, Paulson LC (1998) Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater et al. [37], pp 361-375
-
(1998)
, vol.37
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
16
-
-
14844335469
-
Automatically detecting authentication limitations in commercial security protocols
-
October 1999
-
Brackin S (1999) Automatically detecting authentication limitations in commercial security protocols. In: Proc. 22nd national conference on information systems security, October 1999.http://www.arca.com/ projp_papers/brackin/Nissc99.pdf
-
(1999)
Proc. 22nd National Conference on Information Systems Security
-
-
Brackin, S.1
-
18
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
Carlucci Aiello L, Massacci F (2001) Verifying security protocols as planning in logic programming. ACM Trans Comput Logic 2(4):542-580
-
(2001)
ACM Trans. Comput. Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Carlucci Aiello, L.1
Massacci, F.2
-
19
-
-
84937559950
-
Automated unbounded verification of security protocols
-
Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Chevalier Y, Vigneron L (2002) Automated unbounded verification of security protocols. In: Proc. international conference on computer-aided verification (CAV-02). Lecture notes in computer science, vol 2404. Springer, Berlin Heidelberg New York
-
(2002)
Proc. International Conference on Computer-Aided Verification (CAV-02)
, vol.2404
-
-
Chevalier, Y.1
Vigneron, L.2
-
20
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
IEEE Press, New York
-
Cohen E (2000) TAPS: A first-order verifier for cryptographic protocols. In: Proc. 13th IEEE Computer Security Foundations Workshop. IEEE Press, New York, pp 144-158
-
(2000)
Proc. 13th IEEE Computer Security Foundations Workshop
, pp. 144-158
-
-
Cohen, E.1
-
21
-
-
84956860311
-
Compiling and verifying security protocols
-
Parigot M, Voronkov A (eds), Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Jacquemard F, Rusinowitch M, Vigneron L (2000) Compiling and verifying security protocols. In: Parigot M, Voronkov A (eds) Proceedings of LPAR 2000. Lecture notes in computer science, vol 1955. Springer, Berlin Heidelberg New York, pp 131-160
-
(2000)
Proceedings of LPAR 2000
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
22
-
-
33750230879
-
A sound logic for analysing electronic commerce protocols
-
Quisquater et al. [37]
-
Kessler V, Neumann H (1998) A sound logic for analysing electronic commerce protocols. In: Quisquater et al. [37]
-
(1998)
-
-
Kessler, V.1
Neumann, H.2
-
23
-
-
0342658605
-
Breaking and fixing the Needham - Schroeder public-key protocol using CSP and FDR
-
Margaria T, Steffen B (eds) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Lowe G (1996) Breaking and fixing the Needham - Schroeder public-key protocol using CSP and FDR. In: Margaria T, Steffen B (eds) Proc. 2nd international workshop on tools and algorithms for the construction and analysis of systems (TACAS '96). Lecture notes in computer science, vol 1055. Springer, Berlin Heidelberg New York, pp 147-166
-
(1996)
Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS '96)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
24
-
-
0035067667
-
Fault-preserving simplifying transformations for security protocols
-
Lowe G, Hui ML (2001) Fault-preserving simplifying transformations for security protocols. J Comput Secur 9:3-46
-
(2001)
J. Comput. Secur.
, vol.9
, pp. 3-46
-
-
Lowe, G.1
Hui, M.L.2
-
29
-
-
84940106630
-
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
-
IEEE Press, New York
-
Meadows C (1999) Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In: Proc. SSP-99. IEEE Press, New York, pp 216-231
-
(1999)
Proc. SSP-99
, pp. 216-231
-
-
Meadows, C.1
-
30
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
Meadows C (2003) Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J Select Areas Commun 21(1):44-54
-
(2003)
IEEE J. Select Areas Commun.
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
31
-
-
84958035071
-
A formal specification of requirements for payment transactions in the SET protocol
-
Hirschfeld R (ed), Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Meadows C, Syverson P (1998) A formal specification of requirements for payment transactions in the SET protocol. In: Hirschfeld R (ed) Proc. Financial Cryptography '98, Lecture notes in computer science, vol 1465. Springer, Berlin Heidelberg New York
-
(1998)
Proc. Financial Cryptography '98
, vol.1465
-
-
Meadows, C.1
Syverson, P.2
-
32
-
-
0003503018
-
Isabelle/HOL: A proof assistant for higher-order logic
-
Lecture notes in computer science, tutorial Springer, Berlin Heidelberg New York
-
Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL: A proof assistant for higher-order logic. Lecture notes in computer science tutorial, vol 2283. Springer, Berlin Heidelberg New York
-
(2002)
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
33
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comput Secur 6:85-128
-
(1998)
J. Comput. Secur.
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
34
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
Paulson LC (1999) Inductive analysis of the internet protocol TLS. ACM Trans Inf Syst Secur 2(3):332-351
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
35
-
-
0034950756
-
Relations between secrets: Two formal analyses of the Yahalom protocol
-
Paulson LC (2001) Relations between secrets: Two formal analyses of the Yahalom protocol. J Comput Secur 9(3):197-216
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
37
-
-
0037953376
-
-
(eds) Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Quisquater J-J, Deswarte Y, Meadows C, Gollmann D (eds) (1998) Computer Security - ESORICS 98. Lecture notes in computer science, vol 1485. Springer, Berlin Heidelberg New York
-
(1998)
Computer Security - ESORICS 98
, vol.1485
-
-
Quisquater, J.-J.1
Deswarte, Y.2
Meadows, C.3
Gollmann, D.4
-
38
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi R, Gorrieri R (1997) The compositional security checker: A tool for the verification of information flow security properties. IEEE Trans Softw Eng 23(9):550-571
-
(1997)
IEEE Trans. Softw. Eng.
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
39
-
-
0002219322
-
An attack on a recurive authentication protocol. A cautionary tale
-
Ryan P, Schneider S (1998) An attack on a recurive authentication protocol. A cautionary tale. Inf Process Lett 65(15):7-16
-
(1998)
Inf. Process Lett.
, vol.65
, Issue.15
, pp. 7-16
-
-
Ryan, P.1
Schneider, S.2
-
40
-
-
0003777431
-
The modelling and analysis of security protocols: The CSP approach
-
Addison-Wesley, Reading, MA
-
Ryan PYA, Schneider SA (2000) The modelling and analysis of security protocols: The CSP approach. Addison-Wesley, Reading, MA
-
(2000)
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
41
-
-
0000937825
-
Verifying authentication protocols in CSP
-
Schneider S (1998) Verifying authentication protocols in CSP. IEEE Trans Softw Eng 24(9):741-758
-
(1998)
IEEE Trans. Softw. Eng.
, vol.24
, Issue.9
, pp. 741-758
-
-
Schneider, S.1
-
43
-
-
0003007912
-
Athena: An automatic checker for security protocol analysis
-
IEEE Press, New York
-
Song D (1999) Athena: An automatic checker for security protocol analysis. In: Proc. 12th IEEE Computer Security Foundations Workshop. IEEE Press, New York
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
-
-
Song, D.1
|