-
1
-
-
84956865305
-
Deciding cryptographic protocol adequacy with HOL
-
Aspen Grove, UT, September, Springer-Verlag
-
S. Brackin. Deciding cryptographic protocol adequacy with HOL. In Higher Order Logic Theorem Proving and Its Applications, number 971 in Lecture Notes in Computer Science, pages 90-105, Aspen Grove, UT, September 1995. Springer-Verlag.
-
(1995)
Higher Order Logic Theorem Proving and Its Applications, Number 971 in Lecture Notes in Computer Science
, pp. 90-105
-
-
Brackin, S.1
-
3
-
-
0029718781
-
A HOL extension of GNY for automatically analyzing cryptographic protocols
-
County Kerry, Ireland, June, IEEE
-
S. Brackin. A HOL extension of GNY for automatically analyzing cryptographic protocols. In Proceedings of Computer Security Foundations Workshop IX, County Kerry, Ireland, June 1996. IEEE.
-
(1996)
Proceedings of Computer Security Foundations Workshop IX
-
-
Brackin, S.1
-
5
-
-
85088071184
-
Server-process restrictiveness in HOL
-
Vancouver, BC, August, Springer-Verlag
-
S. Brackin and S-K Chin. Server-process restrictiveness in HOL. In Higher Order Logic Theorem Proving and Its Applications, number 780 in Lecture Notes in Computer Science, pages 454-467, Vancouver, BC, August 1993. Springer-Verlag.
-
(1993)
Higher Order Logic Theorem Proving and Its Applications, Number 780 in Lecture Notes in Computer Science
, pp. 454-467
-
-
Brackin, S.1
Chin, S.-K.2
-
6
-
-
0344792859
-
Reasoning with inductively defined relations in the HOL theorem prover
-
University of Cambridge Computer Laboratory, Cambridge, UK, August
-
J. Camilleri and T. Melham. Reasoning with inductively defined relations in the HOL theorem prover. Technical Report 265, University of Cambridge Computer Laboratory, Cambridge, UK, August 1992.
-
(1992)
Technical Report
, vol.265
-
-
Camilleri, J.1
Melham, T.2
-
7
-
-
84976665942
-
Timestamps in key distribution protocols
-
August
-
D. Denning and G. Sacco. Timestamps in key distribution protocols. CACM, 24(8):533-536, August 1981.
-
(1981)
CACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
8
-
-
0142061219
-
Handling infeasible specifications of cryptographic protocols
-
Pranconia NH, June, IEEE
-
L. Gong. Handling infeasible specifications of cryptographic protocols. In Proceedings of Computer Security Foundations Workshop IV, pages 99-102, Pranconia NH, June 1991. IEEE.
-
(1991)
Proceedings of Computer Security Foundations Workshop IV
, pp. 99-102
-
-
Gong, L.1
-
9
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Oakland, CA, May, IEEE
-
L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the Symposium on Security and Privacy, pages 234248, Oakland, CA, May 1990. IEEE.
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 234248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
11
-
-
35048849862
-
On the automation of GNY logic
-
A. Mathuria, R. Safavi-Naini, and P. Nickolas. On the automation of GNY logic. Australian Computer Science Communications, 17(l):370-379, 1995.
-
(1995)
Australian Computer Science Communications
, vol.17
, Issue.1
, pp. 370-379
-
-
Mathuria, A.1
Safavi-Naini, R.2
Nickolas, P.3
-
12
-
-
0024665570
-
Using narrowing in the analysis of key management protocols
-
Oakland, CA, May, IEEE
-
C. Meadows. Using narrowing in the analysis of key management protocols. In Proceedings of the Symposium on Security and Privacy, pages 138-147, Oakland, CA, May 1989. IEEE.
-
(1989)
Proceedings of the Symposium on Security and Privacy
, pp. 138-147
-
-
Meadows, C.1
-
13
-
-
0026152198
-
A system for the specification and analysis of key management protocols
-
Oakland, CA, May, IEEE
-
C. Meadows. A system for the specification and analysis of key management protocols. In Proceedings of the Symposium on Security and Privacy, pages 182-195, Oakland, CA, May 1991. IEEE.
-
(1991)
Proceedings of the Symposium on Security and Privacy
, pp. 182-195
-
-
Meadows, C.1
-
14
-
-
0342880800
-
Applying formal methods to the' analysis of a key management protocol
-
C. Meadows. Applying formal methods to the' analysis of a key management protocol. J. Computer Security, 1(1):5-36, 1992.
-
(1992)
J. Computer Security
, vol.1
, Issue.1
, pp. 5-36
-
-
Meadows, C.1
-
15
-
-
0021190844
-
The interrogator: A tool for cryptographic protocol analysis
-
Oakland, CA, May, IEEE
-
J. Millen. The interrogator: A tool for cryptographic protocol analysis. In Proceedings of the Symposium on Security and Privacy, pages 134-141, Oakland, CA, May 1984. IEEE.
-
(1984)
Proceedings of the Symposium on Security and Privacy
, pp. 134-141
-
-
Millen, J.1
-
17
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
February
-
J. Millen, S. Clark, and S. Freedman. The Interrogator: Protocol security analysis. IEEE Trans, on Software Engineering, SE-13(2):274-288, February 1987.
-
(1987)
IEEE Trans, on Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.1
Clark, S.2
Freedman, S.3
-
18
-
-
0003851399
-
-
John Wiley & Sons, New York, NY
-
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York, NY, 1995.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
|