-
1
-
-
0003092378
-
A Calculus for Cryptographic Protocols
-
M. Abadi, and A.D. Gordon A Calculus for Cryptographic Protocols Journal of the ACM 148 1 1999 1 70
-
(1999)
Journal of the ACM
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Lecture Notes in Computer Science, Springer-Verlag, to appear
-
Armando, A., D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P.H. Drielsma. P.-C. Héam, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò and L. Vigneron, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, in Proceedings CAV 2005, Lecture Notes in Computer Science, Springer-Verlag, to appear
-
Proceedings CAV 2005
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Mantovani, J.9
Mödersheim, S.10
Von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
4
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Proceedings ESORICS 2003 Springer-Verlag
-
Basin, D., S. Mödersheim and L. Viganò, An On-The-Fly Model-Checker for Security Protocol Analysis, in Proceedings ESORICS 2003, Lecture Notes in Computer Science, Vol. 2808, Springer-Verlag, 253-270
-
Lecture Notes in Computer Science
, vol.2808
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
5
-
-
11944275908
-
Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis
-
S. Bistarelli, I. Cervesato, G. Lenzini, and F. Martinelli Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis Journal of Computer Security 13 1 2005 3 47
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 3-47
-
-
Bistarelli, S.1
Cervesato, I.2
Lenzini, G.3
Martinelli, F.4
-
6
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
Proceedings SAS'02 Springer-Verlag
-
Blanchet, B., From Secrecy to Authenticity in Security Protocols, in Proceedings SAS'02, Lecture Notes in Computer Science, Vol. 2477, Springer-Verlag, 342-359
-
Lecture Notes in Computer Science
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
7
-
-
23144466756
-
Improvements on the Genet and Klay technique to automatically verify security protocols
-
Barcelona, April 2004
-
Boichut, Y., P.-C. Héam, O. Kouchnarenko and F. Oehl, Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols, in Proceedings 3rd International Workshop on Automated Verification of Infinite-State Systems (AVIS 2004), Barcelona, April 2004
-
Proceedings 3rd International Workshop on Automated Verification of Infinite-state Systems (AVIS 2004)
-
-
Boichut, Y.1
Héam, P.-C.2
Kouchnarenko, O.3
Oehl, F.4
-
10
-
-
14844340627
-
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis
-
I. Cervesato, N. Durgin, P.D. Lincoln, J.C. Mitchell, and A. Scedrov A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis Journal of Computer Security 13 2 2005 265 316
-
(2005)
Journal of Computer Security
, vol.13
, Issue.2
, pp. 265-316
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
11
-
-
84949232265
-
Specifying authentication protocols using rewriting and strategies
-
Proceedings PADL 2001 Springer-Verlag
-
Cirstea, H., Specifying Authentication Protocols Using Rewriting and Strategies, in Proceedings PADL 2001, Lecture Notes in Computer Science, Vol. 1990, Springer-Verlag, 138-152
-
Lecture Notes in Computer Science
, vol.1990
, pp. 138-152
-
-
Cirstea, H.1
-
13
-
-
0004060205
-
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi Tree Automata Techniques and Applications URL http://www.grappa.univ-lille3.fr/tata/
-
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
14
-
-
18744397656
-
Protocol specification and analysis in maude
-
Pont-à-Mousson, France
-
Denker, G., J. Meseguer and C. Talcott, Protocol Specification and Analysis in Maude, in Proceedings 2nd WRLA Workshop, Pont-à-Mousson, France, 1998
-
(1998)
Proceedings 2nd WRLA Workshop
-
-
Denker, G.1
Meseguer, J.2
Talcott, C.3
-
15
-
-
84976665942
-
Timestamps in key distributed protocols
-
D. Denning, and G. Sacco Timestamps in key distributed protocols Communications of the ACM 24 8 1981 533 535
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-535
-
-
Denning, D.1
Sacco, G.2
-
17
-
-
84958742938
-
Decidable approximations of sets of descendants and sets of normal forms
-
Proceedings RTA 1998 Springer-Verlag
-
Genet, T., Decidable Approximations of Sets of Descendants and Sets of Normal Forms, in Proceedings RTA 1998, Lecture Notes in Computer Science, Vol. 1379, Springer-Verlag, 151-165
-
Lecture Notes in Computer Science
, vol.1379
, pp. 151-165
-
-
Genet, T.1
-
18
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
Proceedings CADE 2000 Springer-Verlag
-
Genet, T., and F. Klay, Rewriting for Cryptographic Protocol Verification, in Proceedings CADE 2000, Lecture Notes in Artificial Intelligence, Vol. 1831, Springer-Verlag, 271-290
-
Lecture Notes in Artificial Intelligence
, vol.1831
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
19
-
-
84937398672
-
Reachability analysis of term rewriting systems with Timbuk
-
Proceedings LPAR 2001 Springer-Verlag
-
Genet, T., and V. Viet Triem Tong, Reachability Analysis of Term Rewriting Systems with Timbuk, in Proceedings LPAR 2001, Lecture Notes in Artificial Intelligence, Vol. 2250, Springer-Verlag, 695-706
-
Lecture Notes in Artificial Intelligence
, vol.2250
, pp. 695-706
-
-
Genet, T.1
Tong, V.V.T.2
-
20
-
-
23144435679
-
A strategy to deal with divergent rewrite systems
-
Proceedings CTRS 1992 Springer-Verlag
-
Inverardi, P., and M. Nesi, A Strategy to Deal with Divergent Rewrite Systems, in Proceedings CTRS 1992, Lecture Notes in Computer Science, Vol. 656, Springer-Verlag, 458-467
-
Lecture Notes in Computer Science
, vol.656
, pp. 458-467
-
-
Inverardi, P.1
Nesi, M.2
-
21
-
-
18744406797
-
Semi-equational rewriting for divergent rewrite systems
-
Dept. of Pure and Applied Mathematics, University of L'Aquila, July
-
Inverardi, P., and M. Nesi, Semi-equational Rewriting for Divergent Rewrite Systems, Technical Report No. 113, Dept. of Pure and Applied Mathematics, University of L'Aquila, July 1996
-
(1996)
Technical Report No. 113
, vol.113
-
-
Inverardi, P.1
Nesi, M.2
-
23
-
-
84956860311
-
Compiling and verifying security protocols
-
Proceedings LPAR 2000 Springer-Verlag
-
Jacquemard, F., M. Rusinowitch and L. Vigneron, Compiling and Verifying Security Protocols, in Proceedings LPAR 2000, Lecture Notes in Artificial Intelligence, Vol. 1955, Springer-Verlag, 131-160
-
Lecture Notes in Artificial Intelligence
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
24
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceedings TACAS 1996 Springer-Verlag
-
Lowe, G., Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR, in Proceedings TACAS 1996, Lecture Notes in Computer Science, Vol. 1055, Springer-Verlag, 147-166
-
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
25
-
-
20144369157
-
-
Technical Report Dept. of Mathematics and Computer Science, University of Leicester, January
-
Lowe, G., A Family of Attacks upon Authentication Protocols, Technical Report 1997/5, Dept. of Mathematics and Computer Science, University of Leicester, January 1997
-
(1997)
A Family of Attacks upon Authentication Protocols
, vol.1997
, Issue.5
-
-
Lowe, G.1
-
26
-
-
84949740740
-
Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
-
Proceedings ESORICS 1996 Springer-Verlag
-
Meadows, C.A., Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches, in Proceedings ESORICS 1996, Lecture Notes in Computer Science, Vol. 1146, Springer-Verlag, 351-364.
-
Lecture Notes in Computer Science
, vol.1146
, pp. 351-364
-
-
Meadows, C.A.1
-
28
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
Proceedings SAS 1999 Springer-Verlag
-
Monniaux, D., Abstracting Cryptographic Protocols with Tree Automata, in Proceedings SAS 1999, Lecture Notes in Computer Science, Vol. 1694, Springer-Verlag, 149-163
-
Lecture Notes in Computer Science
, vol.1694
, pp. 149-163
-
-
Monniaux, D.1
-
29
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R.M. Needham, and M.D. Schroeder Using Encryption for Authentication in Large Networks of Computers Communications of the ACM 21 12 1978 993 999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
31
-
-
18744387760
-
A Rewriting Strategy for Protocol Verification
-
Final Proceedings WRS'03
-
M. Nesi, G. Rucci, and M. Verdesca A Rewriting Strategy for Protocol Verification Final Proceedings WRS'03 Electronic Notes in Theoretical Computer Science 86 4 2003 URL http://www.sciencedirect.com/science/journal/15710661
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.86
, Issue.4
-
-
Nesi, M.1
Rucci, G.2
Verdesca, M.3
-
32
-
-
23144458630
-
-
Ph.D. Thesis, Dublin City University, School of Computing (in preparation)
-
Oehl, F., "Formal Verification of Cryptographic Protocols", Ph.D. Thesis, Dublin City University, School of Computing, 2005 (in preparation)
-
(2005)
Formal Verification of Cryptographic Protocols
-
-
Oehl, F.1
-
33
-
-
84855624109
-
Combining two approaches for the verification of cryptographic protocols
-
Paphos, December
-
Oehl, F., and D. Sinclair, Combining two approaches for the verification of cryptographic protocols, in Proceedings Workshop on Specification, Analysis and Validation for Emerging Technologies in Computational Logic (SAVE 2001), Paphos, December 2001
-
(2001)
Proceedings Workshop on Specification, Analysis and Validation for Emerging Technologies in Computational Logic (SAVE 2001)
-
-
Oehl, F.1
Sinclair, D.2
-
34
-
-
18744372236
-
Combining Isabelle and Timbuk for cryptographic protocol verification
-
Tunis, September
-
Oehl, F., and D. Sinclair, Combining Isabelle and Timbuk for Cryptographic Protocol Verification, in Proceedings Workshop on Securité de la Communication sur Internet (SECI 2002), Tunis, September 2002, 57-67
-
(2002)
Proceedings Workshop on Securité de la Communication sur Internet (SECI 2002)
, pp. 57-67
-
-
Oehl, F.1
Sinclair, D.2
-
35
-
-
0030705795
-
Proving Properties of Security Protocols by Induction
-
IEEE Computer Society Press
-
L. Paulson Proving Properties of Security Protocols by Induction Proceedings 10th Computer Security Foundations Workshop 1997 IEEE Computer Society Press 70 83
-
(1997)
Proceedings 10th Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.1
-
36
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L.C. Paulson The Inductive Approach to Verifying Cryptographic Protocols Journal of Computer Security 6 1998 85 128
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
37
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
Proceedings CADE 1999 Springer-Verlag
-
Weidenbach, C., Towards an Automatic Analysis of Security Protocols in First-Order Logic, in Proceedings CADE 1999, Lecture Notes in Artificial Intelligence, Vol. 1632, Springer-Verlag, 314-328
-
Lecture Notes in Artificial Intelligence
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|