-
1
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theor. Comput. Sci., 298(3):387-415, 2003.
-
(2003)
Theor. Comput. Sci.
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84942246406
-
Automatic validation of protocol narration
-
June
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. Riis Nielson. Automatic validation of protocol narration. In In proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16), pages 126-140, June 2003.
-
(2003)
In Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16)
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
6
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
LNCS 2076, Springer Verlag
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings of ICALP 01, volume 2076, pages 667-681. LNCS 2076, Springer Verlag, 2001.
-
(2001)
Proceedings of ICALP 01
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
8
-
-
35248816980
-
Principles for entity authentication
-
July
-
M. Bugliesi, R. Focardi, and M. Maffei. Principles for entity authentication. In Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003), volume 2890, pages 294-307, July 2003.
-
(2003)
Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003)
, vol.2890
, pp. 294-307
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
9
-
-
0000523051
-
A Logic of Authentication
-
M. Burrows, M. Abadi, and R. Needham. "A Logic of Authentication". Proceedings of the Royal Society of London, 426(1871):233-271, 1989.
-
(1989)
Proceedings of the Royal Society of London
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Springer LNCS 1853, July
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of ICALP'00, pages 354-372. Springer LNCS 1853, July 2000.
-
(2000)
Proceedings of ICALP'00
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
15
-
-
0025023289
-
Reasoning about Belief in Cryptographic Protocols
-
Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society
-
L. Gong, R. Needham, and R. Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
17
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
IEEE Computer Society Press, 24-26 June
-
A. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop -CSFW'01, pages 77-91. IEEE Computer Society Press, 24-26 June 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop -CSFW'01
, pp. 77-91
-
-
Gordon, A.1
Jeffrey, A.2
-
18
-
-
84948739411
-
Security protocol design via authentication tests
-
Cape Breton, Canada, 24-26 June IEEE Computer Society Press
-
J. Guttman. Security protocol design via authentication tests. In 15th IEEE Computer Security Foundations Workshop - CSFW'01, pages 92-103, Cape Breton, Canada, 24-26 June 2002. IEEE Computer Society Press.
-
(2002)
15th IEEE Computer Security Foundations Workshop - CSFW'01
, pp. 92-103
-
-
Guttman, J.1
-
19
-
-
0037076868
-
Authentication tests and the structure of bundles
-
Joshua D. Guttman and F. Javier Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Javier Thayer, F.2
-
20
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press
-
J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. In 13th IEEE Computer Security Foundations Workshop -CSFW'00, pages 255-268, Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press.
-
13th IEEE Computer Security Foundations Workshop -CSFW'00
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
26
-
-
0034950756
-
Relations between secrets: Two formal analyses of the yahalom protocol
-
L. C. Paulson. Relations between secrets: Two formal analyses of the yahalom protocol. Journal of Computer Security, 9(3):197-216, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
28
-
-
0026630927
-
Authentication for distributed systems
-
T.Y.C. Woo and S.S. Lam. Authentication for distributed systems. IEEE Computer, 25(3):39-51, 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.3
, pp. 39-51
-
-
Woo, T.Y.C.1
Lam, S.S.2
|