-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi Secrecy by typing in security protocols Journal of the ACM 46 5 1999 749 786
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
5
-
-
84957714601
-
Robustness principles for public key protocols
-
Proceedings of advances in cryptography - CRYPTO'95, D. Coppersmith Springer-Verlag
-
R. Anderson, and R.M. Needham Robustness principles for public key protocols D. Coppersmith Proceedings of advances in cryptography - CRYPTO'95 LNCS 963 1995 Springer-Verlag 236 247
-
(1995)
LNCS 963
, pp. 236-247
-
-
Anderson, R.1
Needham, R.M.2
-
6
-
-
35048872309
-
Confidentiality levels and deliberate/indeliberate protocol attacks
-
Proceedings of the 10th international workshop on security protocols Cambridge, UK, B. Christianson B. Crispo W.S. Harbison M. Roe Springer
-
G. Bella, and S. Bistarelli Confidentiality levels and deliberate/indeliberate protocol attacks B. Christianson B. Crispo W.S. Harbison M. Roe Proceedings of the 10th international workshop on security protocols Cambridge, UK LNCS 2845 2002 Springer 104 119
-
(2002)
LNCS 2845
, pp. 104-119
-
-
Bella, G.1
Bistarelli, S.2
-
8
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
Proceedings of the 5th European symposium on research in computer security (ESORICS'98), J.-J. Quisquater Y. Deswarte C. Meadows D. Gollmann Springer-Verlag
-
G. Bella, and L.C. Paulson Kerberos version IV: inductive analysis of the secrecy goals J.-J. Quisquater Y. Deswarte C. Meadows D. Gollmann Proceedings of the 5th European symposium on research in computer security (ESORICS'98) LNCS 1485 1998 Springer-Verlag 361 375
-
(1998)
LNCS 1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
10
-
-
33645660287
-
A protocol's life after attacks
-
Proceedings of the 11th international workshop on security protocols Cambridge, UK Springer-Verlag in press
-
Bella G, Bistarelli S, Massacci F. A protocol's life after attacks. In: Proceedings of the 11th international workshop on security protocols Cambridge, UK, LNCS series. Springer-Verlag; 2003, in press.
-
(2003)
LNCS Series
-
-
Bella, G.1
Bistarelli, S.2
Massacci, F.3
-
12
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S.M. Bellovin, and M. Merritt Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise ACM conference on computer and communications security 1993 p. 244-50
-
(1993)
ACM Conference on Computer and Communications Security
-
-
Bellovin, S.M.1
Merritt, M.2
-
13
-
-
29244468339
-
Semirings for soft constraint solving and programming
-
Springer
-
S. Bistarelli Semirings for soft constraint solving and programming LNCS 2962 2004 Springer
-
(2004)
LNCS 2962
-
-
Bistarelli, S.1
-
15
-
-
84948412454
-
Soft concurrent constraint programming
-
Proceedings of the 11th European symposium on programming (ESOP'02), Springer-Verlag
-
S. Bistarelli, U. Montanari, and F. Rossi Soft concurrent constraint programming Proceedings of the 11th European symposium on programming (ESOP'02) LNCS 2305 2002 Springer-Verlag p. 53-67
-
(2002)
LNCS 2305
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
24
-
-
19144370194
-
On the verification of cryptographic protocols - A tale of two committees
-
Proceedings of the workshop on secure architectures and information flow, Elsevier Science
-
D. Gollmann On the verification of cryptographic protocols - a tale of two committees Proceedings of the workshop on secure architectures and information flow ENTCS 32 2000 Elsevier Science
-
(2000)
ENTCS 32
-
-
Gollmann, D.1
-
25
-
-
23044519498
-
What is authentication?
-
Proceedings of the 7th international workshop on security protocols, B. Christianson B. Crispo J. Malcolm M. Roe Springer-Verlag
-
D. Gollmann What is authentication? B. Christianson B. Crispo J. Malcolm M. Roe Proceedings of the 7th international workshop on security protocols LNCS 1796 2000 Springer-Verlag 65 72
-
(2000)
LNCS 1796
, pp. 65-72
-
-
Gollmann, D.1
-
28
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Information Processing Letters 56 3 1995 131 133
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
30
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Communications of the ACM 21 12 1978 993 999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
33
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson The inductive approach to verifying cryptographic protocols Journal of Computer Security 6 1998 85 128
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
34
-
-
0034950756
-
Relations between secrets: Two formal analyses of the Yahalom protocol
-
L.C. Paulson Relations between secrets: two formal analyses of the Yahalom protocol Journal of Computer Security 9 3 2001 197 216
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
36
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
P.Y.A. Ryan, and S.A. Schneider An attack on a recursive authentication protocol: a cautionary tale Information Processing Letters 65 1998 Elsevier Science Publishers (North-Holland)Amsterdam
-
(1998)
Information Processing Letters
, vol.65
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
|