-
1
-
-
84957795309
-
Private authentication
-
R. Dingledine and P. F. Syverson, editors, volume LNCS 2482, San Francisco, California, Apr 2002. Springer-Verlag, Berlin
-
M. Abadi. Private authentication. In R. Dingledine and P. F. Syverson, editors, 2nd. Int. Workshop on Privacy Enhancing Technologies (PET), volume LNCS 2482, pages 27-40, San Francisco, California, Apr 2002. Springer-Verlag, Berlin.
-
2nd. Int. Workshop on Privacy Enhancing Technologies (PET)
, pp. 27-40
-
-
Abadi, M.1
-
3
-
-
0010314272
-
UPPAAL - Now, next, and future
-
F. Cassez, C. Jard, B. Rozoy, and M. D. Ryand, editors, volume LNCS 2067, Nantes, France, Jun. Springer-Verlag, Berlin
-
T. Amnell, G. Behrmann, J. Bengtsson, P. R. D'Argenio, A. David, A. Fehnker, T. Hune, B. Jeannet, K. G. Larsen, M. O. Möller, P. Pettersson, C. Weise, and W. Yi. UPPAAL - Now, Next, and Future. In F. Cassez, C. Jard, B. Rozoy, and M. D. Ryand, editors, 4th Summer School on Modeling and Verification of Parallel Processes (MOVEP), volume LNCS 2067, pages 99-124, Nantes, France, Jun 2000. Springer-Verlag, Berlin.
-
(2000)
4th Summer School on Modeling and Verification of Parallel Processes (MOVEP)
, pp. 99-124
-
-
Amnell, T.1
Behrmann, G.2
Bengtsson, J.3
D'Argenio, P.R.4
David, A.5
Fehnker, A.6
Hune, T.7
Jeannet, B.8
Larsen, K.G.9
Möller, M.O.10
Pettersson, P.11
Weise, C.12
Yi, W.13
-
4
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
J.-J. Quisquater, editor, Proc. 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium. Springer-Verlag
-
G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In J.-J. Quisquater, editor, Proc. 5th European Symposium on Research in Computer Security, volume 1485 of LNCS, pages 361-375, Louvain-la-Neuve, Belgium, 1998. Springer-Verlag.
-
(1998)
LNCS
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
5
-
-
0000874415
-
Limitations of the kerberos authentication system
-
S. M. Bellovin and M. Merritt. Limitations of the kerberos authentication system. SIGCOMM Comput. Commun. Rev., 20(5):119-132, 1990.
-
(1990)
SIGCOMM Comput. Commun. Rev.
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(l):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.50
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
84958742278
-
An improved constraint-based system for the verification of security protocols
-
M. V. Hermenegildo and G. Puebla, editors, volume LNCS 2477, Madrid, Spain, Sep. Springer-Verlag, Berlin
-
R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In M. V. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symp. (SAS), volume LNCS 2477, pages 326-341, Madrid, Spain, Sep 2002. Springer-Verlag, Berlin.
-
(2002)
9th Int. Static Analysis Symp. (SAS)
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
9
-
-
84957803149
-
MODEST: A modelling language for stochastic timed systems
-
L. de Alfaro and S. Gilmore, editors, volume LNCS 2165, Aachen, Germany, Sep 2001. Springer-Verlag, Berlin
-
P. R. D'Argenio, H. Hermanns, J.-P. Katoen, and J. Klaren. MODEST: A modelling language for stochastic timed systems. In L. de Alfaro and S. Gilmore, editors, Joint Int. Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification (PAPM-PROBMIV), volume LNCS 2165, pages 87-104, Aachen, Germany, Sep 2001. Springer-Verlag, Berlin.
-
Joint Int. Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification (PAPM-PROBMIV)
, pp. 87-104
-
-
D'Argenio, P.R.1
Hermanns, H.2
Katoen, J.-P.3
Klaren, J.4
-
10
-
-
84879482667
-
Proof theory, transformations, and logic programming for debugging security protocols
-
A. Pettorossi, editor, volume LNCS 2372, Paphos, Greece, Nov. Springer-Verlag, Berlin
-
G. Delzanno and S. Etalle. Proof theory, transformations, and logic programming for debugging security protocols. In A. Pettorossi, editor, 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR), volume LNCS 2372, pages 76-90, Paphos, Greece, Nov 2001. Springer-Verlag, Berlin.
-
(2001)
11th Int. Logic Based Program Synthesis and Transformation (LOPSTR)
, pp. 76-90
-
-
Delzanno, G.1
Etalle, S.2
-
11
-
-
35048864876
-
Automatic verification of time sensitive cryptographic protocols
-
Barcelona, Spain, March. Springer-Verlag
-
G. Delzanno and P. Ganty. Automatic verification of time sensitive cryptographic protocols. In TACAS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, pages 342-356, Barcelona, Spain, March 2004. Springer-Verlag.
-
(2004)
TACAS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004
, pp. 342-356
-
-
Delzanno, G.1
Ganty, P.2
-
13
-
-
0030107358
-
Network security under siege: The timing attack
-
Mar
-
E. English and S. Hamilton. Network security under siege: the timing attack. IEEE Computer, 29(3):95-97, Mar 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.3
, pp. 95-97
-
-
English, E.1
Hamilton, S.2
-
14
-
-
84944070422
-
Analysing time dependent security properties in CSP using PVS
-
Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, and Michael Waidner, editors, volume 1895 of LNCS. Springer
-
N. Evans and S. Schneider. Analysing time dependent security properties in CSP using PVS. In Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, and Michael Waidner, editors, ESORICS, volume 1895 of LNCS, pages 222-237. Springer, 2000.
-
(2000)
ESORICS
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
15
-
-
0034449227
-
Timing attacks on web privacy
-
Athens, Greece. ACM Press, New York
-
E. W. Feiten and M. A. Schneider. Timing attacks on web privacy. In 7th ACM conference on Computer and communications security, pages 25-32, Athens, Greece, 2000. ACM Press, New York.
-
(2000)
7th ACM Conference on Computer and Communications Security
, pp. 25-32
-
-
Feiten, E.W.1
Schneider, M.A.2
-
16
-
-
19144368123
-
Formal models of timing attacks on web privacy
-
Marina Lenisa and Marino Miculan, editors, Elsevier
-
R. Focardi, R. Gorrieri, R. Lanotte, A. Maggiolo-Schettini, F. Martinelli, S. Tini, and E. Tronci. Formal models of timing attacks on web privacy. In Marina Lenisa and Marino Miculan, editors, ENTCS, volume 62. Elsevier, 2002.
-
(2002)
ENTCS
, vol.62
-
-
Focardi, R.1
Gorrieri, R.2
Lanotte, R.3
Maggiolo-Schettini, A.4
Martinelli, F.5
Tini, S.6
Tronci, E.7
-
17
-
-
35248847052
-
Hiding names: Private authentication in the applied pi calculus
-
volume LNCS 2609, Tokyo, Japan, Jan. Springer-Verlag Heidelberg
-
C. Fournet and M. Abadi. Hiding names: Private authentication in the applied pi calculus. In Symp. on Software Security, volume LNCS 2609, pages 317-338, Tokyo, Japan, Jan 2003. Springer-Verlag Heidelberg.
-
(2003)
Symp. on Software Security
, pp. 317-338
-
-
Fournet, C.1
Abadi, M.2
-
18
-
-
35248873844
-
A simple language for real-time cryptographic protocol analysis
-
Pierpaolo Degano, editor, volume 2618 of LNCS, Heidelberg. Springer-Verlag
-
R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for real-time cryptographic protocol analysis. In Pierpaolo Degano, editor, 12th European Symposium on Programming, ESOP 2003, volume 2618 of LNCS, pages 114-128, Heidelberg, 2003. Springer-Verlag.
-
(2003)
12th European Symposium on Programming, ESOP 2003
, pp. 114-128
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
19
-
-
84888255686
-
Probabilistic symbolic model checking with PRISM: A hybrid approach
-
J.-P. Katoen and P. Stevens, editors, (TACAS'02). Springer
-
M. Kwiatkowska, G. Norman, and D. Parker. Probabilistic symbolic model checking with PRISM: A hybrid approach. In J.-P. Katoen and P. Stevens, editors, (TACAS'02), volume 2280 of LNCS, pages 52-66. Springer, 2002.
-
(2002)
LNCS
, vol.2280
, pp. 52-66
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
20
-
-
84976782029
-
Using time instead of timeout for fault-tolerant distributed systems
-
April
-
Leslie Lamport. Using time instead of timeout for fault-tolerant distributed systems. ACM Transactions on Programming Languages and Systems, 6(2):254-280, April 1984.
-
(1984)
ACM Transactions on Programming Languages and Systems
, vol.6
, Issue.2
, pp. 254-280
-
-
Lamport, L.1
-
21
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
November
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, November 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
23
-
-
84994742813
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press
-
G. Lowe. A hierarchy of authentication specifications. In In 10th IEEE Computer Security Foundations Workshop, page 3143. IEEE Computer Society Press, 1997.
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 3143
-
-
Lowe, G.1
|