-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
3
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theor. Comput. Sci., 298(3):387-415, 2003.
-
(2003)
Theor. Comput. Sci.
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
19144369108
-
Programming satan's computer
-
Jan van Leeuwen, editor, Computer Science Today - Recent Trends and Developments
-
R. Anderson and R. Needham. Programming satan's computer. In Jan van Leeuwen, editor, Computer Science Today - Recent Trends and Developments, volume 1000 of LNCS, pages 426-440, 1995.
-
(1995)
LNCS
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
6
-
-
84942246406
-
Automatic validation of protocol narration
-
June
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. Riis Nielson. Automatic validation of protocol narration. In In proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16), pages 126-140, June 2003.
-
(2003)
Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16)
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
7
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
LNCS 2076, Springer Verlag
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings of lCALP 01, volume 2076, pages 667-681. LNCS 2076, Springer Verlag, 2001.
-
(2001)
Proceedings of LCALP 01
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
8
-
-
0025522255
-
Hidden assumptions in cryptographic protocols
-
November
-
C. Boyd. Hidden assumptions in cryptographic protocols. IEEE Proceedings, Part E, pages 433-436, November 1990.
-
(1990)
IEEE Proceedings, Part E
, pp. 433-436
-
-
Boyd, C.1
-
9
-
-
35248816980
-
Principles for entity authentication
-
July
-
M. Bugliesi, R. Focardi, and M. Maffei. Principles for entity authentication. In Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003), volume 2890, pages 294-307, July 2003.
-
(2003)
Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003)
, vol.2890
, pp. 294-307
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
11
-
-
0002378128
-
Optimal privacy and authentication on a portable communications system
-
July
-
U.Carlsen. Optimal privacy and authentication on a portable communications system. Operating Systems Review, 28(3):16-23, July 1994.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 16-23
-
-
Carlsen, U.1
-
13
-
-
84976665942
-
Timestamps in key distributed protocols
-
D. Denning and G. Sacco. Timestamps in key distributed protocols. Communication of the ACM, 24(8):533-535, 1981.
-
(1981)
Communication of the ACM
, vol.24
, Issue.8
, pp. 533-535
-
-
Denning, D.1
Sacco, G.2
-
15
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Springer LNCS 1853, July
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of ICALP'00, pages 354-372. Springer LNCS 1853, July 2000.
-
(2000)
Proceedings of ICALP'00
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
17
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
IEEE Computer Society Press, 24-26 June
-
A. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop - CSFW'01, pages 77-91. IEEE Computer Society Press, 24-26 June 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop - CSFW'01
, pp. 77-91
-
-
Gordon, A.1
Jeffrey, A.2
-
18
-
-
84948739411
-
Security protocol design via authentication tests
-
Cape Breton, Canada, 24-26 June. IEEE Computer Society Press
-
J. Guttman. Security protocol design via authentication tests. In 15th IEEE Computer Security Foundations Workshop - CSFW'01, pages 92-103, Cape Breton, Canada, 24-26 June 2002. IEEE Computer Society Press.
-
(2002)
15th IEEE Computer Security Foundations Workshop - CSFW'01
, pp. 92-103
-
-
Guttman, J.1
-
19
-
-
0037076868
-
Authentication tests and the structure of bundles
-
Joshua D. Guttman and F. Javier Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
20
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
Cambridge, UK, 3-5 July. IEEE Computer Society Press
-
J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. In 13th IEEE Computer Security Foundations Workshop - CSFW'00, pages 255-268, Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press.
-
(2000)
13th IEEE Computer Security Foundations Workshop - CSFW'00
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
22
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer-Verlag, Berlin Germany
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
23
-
-
35848959071
-
Using CSP to detect errors in the TMN protocol
-
October
-
G. Lowe and B. Roscoe. Using CSP to detect errors in the TMN protocol. IEEE Transaction on Software Engineering, 23(10):659-669, October 1997.
-
(1997)
IEEE Transaction on Software Engineering
, vol.23
, Issue.10
, pp. 659-669
-
-
Lowe, G.1
Roscoe, B.2
-
26
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
27
-
-
0034950756
-
Relations between secrets: Two formal analyses of the yahalom protocol
-
L. C. Paulson. Relations between secrets: Two formal analyses of the yahalom protocol. Journal of Computer Security, 9(3):197-216, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
28
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
M.D. Schroeder R.M. Needham. Using encryption for authentication in large networks of computers. ACM Communication, 21(12):993-999, 1978.
-
(1978)
ACM Communication
, vol.21
, Issue.12
, pp. 993-999
-
-
Schroeder, M.D.1
Needham, R.M.2
-
29
-
-
0002508587
-
A lesson on authentication protocol design
-
Thomas Y. C. Woo and Simon S. Lam. A lesson on authentication protocol design. Operating Systems Review, 28(3):24-37, 1994.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
30
-
-
0026630927
-
Authentication for distributed systems
-
T.Y.C. Woo and S.S. Lam. Authentication for distributed systems. IEEE Computer, 25(3):39-51, 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.3
, pp. 39-51
-
-
Woo, T.Y.C.1
Lam, S.S.2
|