-
1
-
-
0000523051
-
A logic of authentication
-
Burrows M., M. Abadi and R. Needham, A logic of authentication, Proceedings of the Royal Society Series A, 426 (1989), pp. 233-271
-
(1989)
Proceedings of the Royal Society Series a
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0003185332
-
-
February
-
in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
-
6
-
-
0012841819
-
Security goals: Packet trajectories and strand spaces
-
R. Gorrieri, & R. Focardi. LNCS 2171. Springer Verlag. Forthcoming
-
Guttman J.D. Security goals: Packet trajectories and strand spaces. Gorrieri R., Focardi R. Foundations of Security Analysis and Design. LNCS 2171 :2001;Springer Verlag. Forthcoming
-
(2001)
Foundations of Security Analysis and Design
-
-
Guttman, J.D.1
-
11
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceedings of TACAS
-
Lowe G., Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proceedings of TACAS, Lecture Notes in Computer Science 1055 (1996), pp. 147-166.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
14
-
-
0003317915
-
A model checker for authentication protocols
-
C. Meadows and H. Orman, editors DIMACS, Rutgers University
-
Marrero W., E. Clarke and S. Jha, A model checker for authentication protocols, in: C. Meadows and H. Orman, editors, Proceedings of the DIMACS Workshop on Design and Verification of Security Protocols, DIMACS, Rutgers University, 1997.
-
(1997)
Proceedings of the DIMACS Workshop on Design and Verification of Security Protocols
-
-
Marrero, W.1
Clarke, E.2
Jha, S.3
-
15
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM. 21:1978
-
(1978)
Communications of the ACM
, vol.21
-
-
Needham, R.1
Schroeder, M.2
-
16
-
-
0023247970
-
Efficient and timely mutual authentication
-
Otway D., Rees O. Efficient and timely mutual authentication. Operating Systems Review. 21:1987;8-10
-
(1987)
Operating Systems Review
, vol.21
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
17
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
also Report 443, Cambridge University Computer Lab
-
Paulson, L. C., The inductive approach to verifying cryptographic protocols, Journal of Computer Security (1998), also Report 443, Cambridge University Computer Lab.
-
(1998)
Journal of Computer Security
-
-
Paulson, L.C.1
-
18
-
-
0034950756
-
Relations between secrets: Two formal analyses of the Yahalom protocol
-
Paulson, L. C., Relations between secrets: Two formal analyses of the Yahalom protocol, Journal of Computer Security (2001)
-
(2001)
Journal of Computer Security
-
-
Paulson, L.C.1
-
20
-
-
0033682447
-
Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
-
Perrig A. and D. X. Song, Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000).
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
-
-
Perrig, A.1
Song, D.X.2
|