-
3
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
R. Baumgart, editor LNCS 1740, Springer-Verlag, Berlin
-
Basin D., Lazy infinite-state analysis of security protocols, in: R. Baumgart, editor, Proceedings of CQRE'99, LNCS 1740, Springer-Verlag, Berlin, 1999 pp. 30-42.
-
(1999)
Proceedings of CQRE'99
, pp. 30-42
-
-
Basin, D.1
-
10
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
D. Cooper and T. Lunt, editors IEEE Computer Society
-
Gong L., R. Needham and R. Yahalom, Reasoning About Belief in Cryptographic Protocols, in: D. Cooper and T. Lunt, editors, Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, 1990 pp. 234-248.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
11
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
T. Margaria and B. Steffen, editors LNCS 1055, Springer-Verlag, Berlin
-
Lowe G., Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: T. Margaria and B. Steffen, editors, Proceedings of TACAS'96, LNCS 1055, Springer-Verlag, Berlin, 1996 pp. 147-166.
-
(1996)
Proceedings of TACAS'96
, pp. 147-166
-
-
Lowe, G.1
-
13
-
-
0003267035
-
Isabelle: A generic theorem prover
-
Berlin: Springer-Verlag
-
Paulson L.C. "Isabelle: a generic theorem prover," LNCS 828. 1994;Springer-Verlag, Berlin
-
(1994)
LNCS
, vol.828
-
-
Paulson, L.C.1
-
14
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security. 6:1998;85-128
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
15
-
-
84974755213
-
Knowledge, belief, and semantics in the analysis of cryptographic protocols
-
Syverson P.F. Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security. 1:1992;317-334
-
(1992)
Journal of Computer Security
, vol.1
, pp. 317-334
-
-
Syverson, P.F.1
-
16
-
-
84924758404
-
Group principals and the formalization of anonymity
-
J. Wing, J. Woodcock and J. Davies, editors LNCS 1708, Springer-Verlag, Berlin
-
Syverson, P. F. and S. G. Stubblebine, Group principals and the formalization of anonymity, in: J. Wing, J. Woodcock and J. Davies, editors, Proceedings of FM'99, LNCS 1708, Springer-Verlag, Berlin, 1999 pp. 814-833.
-
(1999)
Proceedings of FM'99
, pp. 814-833
-
-
Syverson, P.F.1
Stubblebine, S.G.2
-
18
-
-
19144364250
-
On total awareness logics
-
M. de Rijke. Dordrecht: Kluwer Academic Publishers
-
Thijsse E. On total awareness logics. de Rijke M. Defaults and Diamonds. 1993;309-347 Kluwer Academic Publishers, Dordrecht
-
(1993)
Defaults and Diamonds
, pp. 309-347
-
-
Thijsse, E.1
-
19
-
-
84949768259
-
Formal semantics for authentication logics
-
E. Bertino, H. Kurth, G. Martella and E. Montolivo, Editors, Proceedings of ESORICS'96, Springer-Verlag, Berlin
-
Wedel G. and V. Kessler, Formal semantics for authentication logics, in: E. Bertino, H. Kurth, G. Martella and E. Montolivo, editors, Proceedings of ESORICS'96, LNCS 1146, Springer-Verlag, Berlin, 1996 pp. 219-241.
-
(1996)
LNCS
, vol.1146
, pp. 219-241
-
-
Wedel, G.1
Kessler, V.2
|