-
1
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi, and B. Blanchet Analyzing security protocols with secrecy types and logic programs Journal of the ACM 52 1 2005 102 146
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
33645689192
-
Certified email with a light on-line trusted third party: Design and implementation
-
WWW'02, May 2002, Honolulu, HA, USA ACM Press
-
M. Abadi, N. Glew, B. Horne, and B. Pinkas Certified email with a light on-line trusted third party: Design and implementation 11th International World Wide Web Conference WWW'02, May 2002, Honolulu, HA, USA 2002 ACM Press
-
(2002)
11th International World Wide Web Conference
-
-
Abadi, M.1
Glew, N.2
Horne, B.3
Pinkas, B.4
-
3
-
-
35248826039
-
Verifying second-level security protocols
-
D. Basin B. Wolff (Eds.), Theorem Proving in Higher Order Logics, TPHOLs'03, September 2003, Roma, Italy Springer Verlag
-
G. Bella, C. Longo, and L.C. Paulson Verifying second-level security protocols D. Basin B. Wolff Theorem Proving in Higher Order Logics TPHOLs'03, September 2003, Roma, Italy Lecture Notes in Computer Science vol. 2758 2003 Springer Verlag 352 366
-
(2003)
Lecture Notes in Computer Science
, vol.2758
, pp. 352-366
-
-
Bella, G.1
Longo, C.2
Paulson, L.C.3
-
4
-
-
0038011251
-
The verification of an industrial payment protocol: The SET purchase phase
-
V. Atluri CCS'02, November 2002, Washington, DC ACM Press
-
G. Bella, F. Massacci, and L.C. Paulson The verification of an industrial payment protocol: The SET purchase phase V. Atluri 9th ACM Conference on Computer and Communications Security CCS'02, November 2002, Washington, DC 2002 ACM Press 12 20
-
(2002)
9th ACM Conference on Computer and Communications Security
, pp. 12-20
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
5
-
-
24344446006
-
Using Isabelle to prove properties of the Kerberos authentication system
-
September 1997, Piscataway, NJ
-
G. Bella, L.C. Paulson, Using Isabelle to prove properties of the Kerberos authentication system, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997, Piscataway, NJ, 1997
-
(1997)
DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Bella, G.1
Paulson, L.C.2
-
6
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
J.-J. Quisquater et al. (Eds.), Computer Security - ESORICS 98, September 1998, Louvain-la-Neuve, Belgium Springer Verlag
-
G. Bella, and L.C. Paulson Kerberos version IV: inductive analysis of the secrecy goals J.-J. Quisquater Computer Security - ESORICS 98 September 1998, Louvain-la-Neuve, Belgium Lecture Notes in Computer Science vol. 1485 1998 Springer Verlag 361 375
-
(1998)
Lecture Notes in Computer Science
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
7
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada IEEE Computer Society
-
B. Blanchet An efficient cryptographic protocol verifier based on Prolog rules 14th IEEE Computer Security Foundations Workshop CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada 2001 IEEE Computer Society 82 96
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
8
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
M. Hermenegildo G. Puebla (Eds.), 9th International Static Analysis Symposium, SAS'02, September 2002, Madrid, Spain Springer Verlag
-
B. Blanchet From secrecy to authenticity in security protocols M. Hermenegildo G. Puebla 9th International Static Analysis Symposium SAS'02, September 2002, Madrid, Spain Lecture Notes in Computer Science vol. 2477 2002 Springer Verlag 342 359
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
9
-
-
0348216654
-
A calculus for secure mobility
-
V. Saraswat (Ed.), Eighth Asian Computing Science Conference, ASIAN'03, December 2003, Mumbai, India Springer Verlag
-
B. Blanchet, and B. Aziz A calculus for secure mobility V. Saraswat Eighth Asian Computing Science Conference ASIAN'03, December 2003, Mumbai, India Lecture Notes in Computer Science vol. 2896 2003 Springer Verlag 188 204
-
(2003)
Lecture Notes in Computer Science
, vol.2896
, pp. 188-204
-
-
Blanchet, B.1
Aziz, B.2
-
10
-
-
0034835462
-
Authenticity by typing for security protocols
-
CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada IEEE Computer Society
-
A. Gordon, and A. Jeffrey Authenticity by typing for security protocols 14th IEEE Computer Security Foundations Workshop CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada 2001 IEEE Computer Society 145 159
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 145-159
-
-
Gordon, A.1
Jeffrey, A.2
-
11
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada IEEE Computer Society
-
A. Gordon, and A. Jeffrey Types and effects for asymmetric cryptographic protocols 15th IEEE Computer Security Foundations Workshop CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada 2002 IEEE Computer Society 77 91
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 77-91
-
-
Gordon, A.1
Jeffrey, A.2
-
13
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada IEEE Computer Society
-
S. Kremer, and J.-F. Raskin Game analysis of abuse-free contract signing 15th IEEE Computer Security Foundations Workshop CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada 2002 IEEE Computer Society 206 222
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 206-222
-
-
Kremer, S.1
Raskin, J.-F.2
-
14
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
January 1998, San Antonio, TX
-
J.C. Mitchell, V. Shmatikov, and U. Stern Finite-state analysis of SSL 3.0 7th USENIX Security Symposium January 1998, San Antonio, TX 1998 201 216
-
(1998)
7th USENIX Security Symposium
, pp. 201-216
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
16
-
-
0031633214
-
Formal analysis of a non-repudiation protocol
-
CSFW-11, June 1998, Rockport, MA IEEE Computer Society
-
S. Schneider Formal analysis of a non-repudiation protocol 11th IEEE Computer Security Foundations Workshop CSFW-11, June 1998, Rockport, MA 1998 IEEE Computer Society 54 65
-
(1998)
11th IEEE Computer Security Foundations Workshop
, pp. 54-65
-
-
Schneider, S.1
-
17
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov, and J.C. Mitchell Finite-state analysis of two contract signing protocols Theoretical Computer Science 283 2 2002 419 450
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
|