-
1
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi, and B. Blanchet Secrecy types for asymmetric communication Theor. Comput. Sci. 298 3 2003 387 415
-
(2003)
Theor. Comput. Sci.
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
84942246406
-
Automatic validation of protocol narration
-
(CSFW'03) IEEE Computer Society Press
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. Riis Nielson Automatic validation of protocol narration Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03) June 2003 IEEE Computer Society Press 126 140
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
4
-
-
21144444143
-
Compositional analysis of authentication protocols
-
Proceedings of European Symposium on Programming (ESOP 2004) Springer-Verlag
-
M. Bugliesi, R. Focardi, and M. Maffei Compositional analysis of authentication protocols Proceedings of European Symposium on Programming (ESOP 2004) Lecture Notes in Computer Science volume 2986 2004 Springer-Verlag 140 154
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
7
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
LNCS 1853 July. Springer
-
R. Focardi, R. Gorrieri, and F. Martinelli Non interference for the analysis of cryptographic protocols Proceedings of ICALP'00 LNCS 1853 July 2000 Springer 1 12
-
(2000)
Proceedings of ICALP'00
, pp. 1-12
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
8
-
-
18444408644
-
ρ-spi calculus at work: Authentication case studies
-
Proceedings of Mefisto Project
-
R. Focardi, and M. Maffei ρ-spi calculus at work: Authentication case studies Proceedings of Mefisto Project Electronic Notes in Theoretical Computer Science 99 August 2004 268 293 Elsevier
-
(2004)
Electronic Notes in Theoretical Computer Science
, vol.99
, pp. 268-293
-
-
Focardi, R.1
Maffei, M.2
-
10
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
(CSFW'02) 2426 June IEEE Computer Society Press
-
A. Gordon, and A. Jeffrey Types and effects for asymmetric cryptographic protocols Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW'02) 24-26 June 2002 IEEE Computer Society Press 77 91
-
(2002)
Proceedings of 15th IEEE Computer Security Foundations Workshop
, pp. 77-91
-
-
Gordon, A.1
Jeffrey, A.2
-
15
-
-
18444389709
-
Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer
-
to appear
-
C. Meadows and P. Syverson. Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer, 2003. to appear in Journal of Computer Security
-
(2003)
Journal of Computer Security
-
-
Meadows, C.1
Syverson, P.2
-
16
-
-
84955583138
-
Open issues in formal methods for cryptographic protocol analysis
-
Catherine Meadows Open issues in formal methods for cryptographic protocol analysis Lecture Notes in Computer Science 2052 2001 21 36
-
(2001)
Lecture Notes in Computer Science
, vol.2052
, pp. 21-36
-
-
Catherine, M.1
-
19
-
-
0034950756
-
Relations between secrets: Two formal analyses of the yahalom protocol
-
L.C. Paulson Relations between secrets: Two formal analyses of the yahalom protocol Journal of Computer Security 9 3 2001 197 216
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
|