-
1
-
-
0027969914
-
Prudent engineering practice for cryptographic protocols
-
ieee, ieee Computer Society Press, 252
-
Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. In Proceedings, 1994 IEEE Symposium on Research in Security and Privacy, pages 122–136. ieee, ieee Computer Society Press, 1994. 252
-
(1994)
Proceedings, 1994 IEEE Symposium on Research in Security and Privacy
, pp. 122-136
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
August, 210, 212
-
Randal E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35(8):677–691, August 1986. 210, 212
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
4
-
-
0000523051
-
A logic of authentication
-
Series A, December, Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36. 219
-
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society, Series A, 426(1871):233–271, December 1989. Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36. 219
-
(1871)
Proceedings of the Royal Society
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
0002378128
-
Optimal privacy and authentication on a portable communications system
-
226
-
Ulf Carlsen. Optimal privacy and authentication on a portable communications system. Operating Systems Review, 28(3):16–23, 1994. 226
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 16-23
-
-
Carlsen, U.1
-
9
-
-
0020720357
-
On the security of public-key protocols
-
198, 219, 251
-
D. Dolev and A. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 29:198–208, 1983. 198, 219, 251
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
11
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
IEEE Computer Society Press, 199, 200, 208, 209, 210
-
Joshua D. Guttman. Filtering postures: Local enforcement for global policies. In Proceedings, 1997 IEEE Symposium on Security and Privacy, pages 120–29. IEEE Computer Society Press, May 1997. 199, 200, 208, 209, 210
-
(1997)
Proceedings, 1997 IEEE Symposium on Security and Privacy
, pp. 120-129
-
-
Guttman, J.D.1
-
13
-
-
85045332695
-
-
D. Gollman, editor, ESORICS 2000: European Symposium on Research in Computer Security, LNCS. Springer Verlag, 199, 200, 203
-
Joshua D. Guttman, Amy L. Herzog, and F. Javier Thayer. Authentication and confidentiality via IPsec. In D. Gollman, editor, ESORICS 2000: European Symposium on Research in Computer Security, LNCS. Springer Verlag, 2000. 199, 200, 203
-
(2000)
Authentication and Confidentiality via Ipsec
-
-
Guttman, J.D.1
Herzog, A.L.2
Javier Thayer, F.3
-
14
-
-
0033706934
-
Authentication tests
-
May, IEEE Computer Society Press, 199, 251
-
Joshua D. Guttman and F. Javier Thayer Fábrega. Authentication tests. In Proceedings, 2000 IEEE Symposium on Security and Privacy. May, IEEE Computer Society Press, 2000. 199, 251
-
(2000)
Proceedings, 2000 IEEE Symposium on Security and Privacy
-
-
Guttman, J.D.1
Javier Thayer Fábrega, F.2
-
16
-
-
0010276593
-
Authentication tests and the structure of bundles
-
To appear. 199, 224, 229, 234, 246
-
Joshua D. Guttman and F. Javier Thayer Fábrega. Authentication tests and the structure of bundles. Theoretical Computer Science, 2001. To appear. 199, 224, 229, 234, 246
-
(2001)
Theoretical Computer Science
-
-
Guttman, J.D.1
Javier Thayer Fábrega, F.2
-
20
-
-
0033683607
-
Toward automatic verification of authentication protocols on an unbounded network
-
IEEE Computer Society Press, July, 240
-
James Heather and Steve Schneider. Toward automatic verification of authentication protocols on an unbounded network. In Proceedings, 13th Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000. 240
-
(2000)
Proceedings, 13Th Computer Security Foundations Workshop
-
-
Heather, J.1
Schneider, S.2
-
21
-
-
0032691953
-
Safe simplifying transformations for security protocols
-
IEEE Computer Society Press, 252
-
Mei Lin Hui and Gavin Lowe. Safe simplifying transformations for security protocols. In 12th Computer Security Foundations Workshop Proceedings, pages 32–43. IEEE Computer Society Press, June 1999. 252
-
(1999)
12Th Computer Security Foundations Workshop Proceedings
, pp. 32-43
-
-
Hui, M.L.1
Lowe, G.2
-
23
-
-
84956985093
-
-
In Security Protocols, International Workshop April 1997 Proceedings, Springer-Verlag, 251
-
John Kelsey, Bruce Schneier, and David Wagner. Protocol interactions and the chosen protocol attack. In Security Protocols, International Workshop April 1997 Proceedings, pages 91–104. Springer-Verlag, 1998. 251
-
(1998)
Protocol Interactions and the Chosen Protocol Attack
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
25
-
-
0004148166
-
-
INRIA, Version 3.00. 217
-
Xavier Leroy, Damien Doligez, Jacques Garrigue, Didier Rémy, and Jérôme Vouillon. The Objective Caml System. INRIA, http://caml.inria.fr/, 2000. Version 3.00. 217
-
(2000)
The Objective Caml System
-
-
Leroy, X.1
Doligez, D.2
Garrigue, J.3
Rémy, D.4
Vouillon, J.5
-
26
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
247
-
Gavin Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3):131–136, November 1995. 247
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
27
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer Verlag, 221, 231, 247
-
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceeedings of tacas, volume 1055 of Lecture Notes in Computer Science, pages 147–166. Springer Verlag, 1996. 221, 231, 247
-
(1996)
Proceeedings of Tacas, Volume 1055 of Lecture Notes in Computer Science
, pp. 147-166
-
-
Lowe, G.1
-
29
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE Computer Society Press, 236
-
Gavin Lowe. Casper: A compiler for the analysis of security protocols. In 10th Computer Security Foundations Workshop Proceedings, pages 18–30. IEEE Computer Society Press, 1997. 236
-
(1997)
10Th Computer Security Foundations Workshop Proceedings
, pp. 18-30
-
-
Lowe, G.1
-
30
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press, 238
-
Gavin Lowe. A hierarchy of authentication specifications. In 10th Computer Security Foundations Workshop Proceedings, pages 31–43. IEEE Computer Society Press, 1997. 238
-
(1997)
10Th Computer Security Foundations Workshop Proceedings
, pp. 31-43
-
-
Lowe, G.1
-
31
-
-
0031634547
-
Toward a completeness result for model checking of security protocols
-
IEEE Computer Society Press, 252
-
Gavin Lowe. Toward a completeness result for model checking of security protocols. In 11th Computer Security Foundations Workshop Proceedings, pages 96–105. IEEE Computer Society Press, 1998. 252
-
(1998)
11Th Computer Security Foundations Workshop Proceedings
, pp. 96-105
-
-
Lowe, G.1
-
32
-
-
85045294515
-
-
Cathy Meadows and Hilary Orman, editors, Proceedings of the DIMACS Workshop on Design and Verification of Security Protocols. DIMACS, Rutgers University, September, 236
-
Will Marrero, Edmund Clarke, and Somesh Jha. A model checker for authentication protocols. In Cathy Meadows and Hilary Orman, editors, Proceedings of the DIMACS Workshop on Design and Verification of Security Protocols. DIMACS, Rutgers University, September 1997. 236
-
(1997)
A Model Checker for Authentication Protocols
-
-
Marrero, W.1
Clarke, E.2
Jha, S.3
-
35
-
-
0032630725
-
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
-
IEEE Computer Society Press, 251
-
Catherine Meadows. Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer. In Proceedings, 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 1999. 251
-
(1999)
Proceedings, 1999 IEEE Symposium on Security and Privacy
-
-
Meadows, C.1
-
37
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), December 1978. 220
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 220
-
-
Needham, R.1
Schroeder, M.2
-
38
-
-
0002088427
-
A note on the use of timestamps as nonces
-
April, 248, 255
-
B. Clifford Neuman and Stuart G. Stubblebine. A note on the use of timestamps as nonces. Operating Systems Review, 27(2):10–14, April 1993. 248, 255
-
(1993)
Operating Systems Review
, vol.27
, Issue.2
, pp. 10-14
-
-
Clifford Neuman, B.1
Stubblebine, S.G.2
-
39
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE Computer Society Press, 236
-
Lawrence C. Paulson. Proving properties of security protocols by induction. In 10th IEEE Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997. 236
-
(1997)
10Th IEEE Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.C.1
-
40
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Also Report 443, Cambridge University Computer Lab. 237, 240
-
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998. Also Report 443, Cambridge University Computer Lab. 237, 240
-
(1998)
Journal of Computer Security
-
-
Paulson, L.C.1
-
41
-
-
0033682447
-
Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
-
IEEE Computer Society Press, July, 246
-
Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000. 246
-
(2000)
Proceedings of the 13Th IEEE Computer Security Foundations Workshop
-
-
Perrig, A.1
Song, D.X.2
-
45
-
-
0011137927
-
A reduction for automated verification of authentication protocols
-
252
-
Scott Stoller. A reduction for automated verification of authentication protocols. In Workshop on Formal Methods and Security Protocols, July 1999. Available at http://www.cs.indiana.edu/˜stoller/. 252
-
(1999)
Workshop on Formal Methods and Security Protocols
-
-
Stoller, S.1
-
46
-
-
0032671776
-
Mixed strand spaces
-
IEEE Computer Society Press, 251, 252, 257
-
F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Mixed strand spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1999. 251, 252, 257
-
(1999)
Proceedings of the 12Th IEEE Computer Security Foundations Workshop
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
47
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
199, 224, 225, 229, 232, 234, 238
-
F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2/3):191–230, 1999. 199, 224, 225, 229, 232, 234, 238
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
50
-
-
0343762482
-
-
Internet draft, November, Also named draft-ietf-secsh-architecture-01.txt. 219
-
T. Ylonen, T. Kivinen, and M. Saarinen. SSH prototcol architecture. Internet draft, November 1997. Also named draft-ietf-secsh-architecture-01.txt. 219
-
(1997)
SSH Prototcol Architecture
-
-
Ylonen, T.1
Kivinen, T.2
Saarinen, M.3
|