-
2
-
-
0034138322
-
The verification logic for secure electronic protocols
-
Bai S, Chen QF (2002) The verification logic for secure electronic protocols. J Software (China) 11(2):213-221
-
(2002)
J. Software (China)
, vol.11
, Issue.2
, pp. 213-221
-
-
Bai, S.1
Chen, Q.F.2
-
3
-
-
84944035753
-
Formal Verification of cardholder registration in SET
-
Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
Bella G, Massacci F, Paulson L, Tramontano P (2000) Formal Verification of cardholder registration in SET. In: Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS'00), Lecture Notes in Computer Science. Springer-Verlag, Berlin, pp 159-174
-
(2000)
Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS'00)
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.3
Tramontano, P.4
-
4
-
-
0022015288
-
Secure communications using remote procedure calls
-
Birrell A (1985) Secure communications using remote procedure calls. ACM Trans Comput Syst 3(1):1-14
-
(1985)
ACM Trans. Comput. Syst.
, vol.3
, Issue.1
, pp. 1-14
-
-
Birrell, A.1
-
5
-
-
0029718781
-
A HOL extension of GNY for automatically analyzing cryptographic protocols
-
IEEE Computer Society Press
-
Brackin S (1996) A HOL extension of GNY for automatically analyzing cryptographic protocols. In: Proceeding of the Ninth IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, pp 62-76
-
(1996)
Proceeding of the Ninth IEEE Computer Security Foundations Workshop
, pp. 62-76
-
-
Brackin, S.1
-
8
-
-
84976665942
-
Timestamp in key distribution protocols
-
Denning D, Sacco G (1981) Timestamp in key distribution protocols. Commun ACM 24(8):533-536
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
10
-
-
0020720357
-
On the security of public key protocols
-
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198-208
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
12
-
-
20344390716
-
-
Forrester (1998) http://www.forrester.com/ER/research
-
(1998)
-
-
Forrester1
-
13
-
-
0142061219
-
Handling infeasible specifications of cryptographic protocols
-
Franconia, NH
-
Gong L (1991) Handling infeasible specifications of cryptographic protocols. In: Proceedings of Computer Security Foundations Workshop IV, Franconia, NH, pp 99-102
-
(1991)
Proceedings of Computer Security Foundations Workshop IV
, pp. 99-102
-
-
Gong, L.1
-
14
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Oakland, CA
-
Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proceeding of the Symposium on Security and Privacy, Oakland, CA, pp 234-248
-
(1990)
Proceeding of the Symposium on Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
16
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
Gong L (1992) A security risk of depending on synchronized clocks. ACM Oper Syst Rev 26(1):49-53
-
(1992)
ACM Oper. Syst. Rev.
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
17
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
Gritzalis S (1999) Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Comput Commun 22(8):695-707
-
(1999)
Comput. Commun.
, vol.22
, Issue.8
, pp. 695-707
-
-
Gritzalis, S.1
-
19
-
-
20344394066
-
-
ITU-T ITU-T X.509 The Directory - An Authentication Framework. ITU-T
-
ITU-T ITU-T X.509 (1998) The Directory - An Authentication Framework. ITU-T
-
(1998)
-
-
-
20
-
-
0029210095
-
Reasoning about accountability in protocols for electronic commerce
-
IEEE Computer Society Press, Los Alamitos, CA
-
Kailar R (1995) Reasoning about accountability in protocols for electronic commerce. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, pp 236-250
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 236-250
-
-
Kailar, R.1
-
21
-
-
85063336121
-
AUTLOG - An advanced logic of authentication
-
Los Alamitors. IEEE Computer Society Press, Los Alamitos, CA
-
Kessler V, Wedel G (1994) AUTLOG - An advanced logic of authentication. In: Proceedings of the 7th IEEE Computer Security Foundations Workshop, Los Alamitors. IEEE Computer Society Press, Los Alamitos, CA, pp 90-99
-
(1994)
Proceedings of the 7th IEEE Computer Security Foundations Workshop
, pp. 90-99
-
-
Kessler, V.1
Wedel, G.2
-
23
-
-
0030084918
-
The NRL Protocol Analyzer: An overview
-
Meadows C (1996) The NRL Protocol Analyzer: An overview. J Logic Program 26(2):113-131
-
(1996)
J. Logic. Program.
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
24
-
-
84958035071
-
A formal specification of requirements for payment transactions in the SET protocol
-
Hirschfeld R. (ed) Lecture Notes in Computer Science Springer-Verlag, Berlin
-
Meadows C, Syverson P (1998) A formal specification of requirements for payment transactions in the SET protocol. In: Hirschfeld R (ed) Proceedings of Financial Cryptography 98. Lecture Notes in Computer Science 1465:122-140. Springer-Verlag, Berlin
-
(1998)
Proceedings of Financial Cryptography 98
, vol.1465
, pp. 122-140
-
-
Meadows, C.1
Syverson, P.2
-
26
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R, Schroeder M (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993-999
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
27
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Neuman B, Ts'o T (1994) Kerberos: An authentication service for computer networks. IEEE Commun 32(9):33-38
-
(1994)
IEEE Commun.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
|