-
1
-
-
0003515822
-
Explicit communication revisited: Two new attacks on authentication protocols
-
March
-
Martín Abadi. Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Transactions on Software Engineering, 23(3): 185-186, March 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.3
, pp. 185-186
-
-
Abadi, M.1
-
3
-
-
17644411480
-
Mobile values, news names, and secure communication
-
London, United Kingdom, January ACM Press
-
Martín Abadi and Cédric Fournet. Mobile Values, News Names, and Secure Communication. In 28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), pages 104-115, London, United Kingdom, January 2001. ACM Press.
-
(2001)
28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
January
-
Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1): 6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Cape Breton, Canada, June
-
Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, Canada, June 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
-
-
Blanchet, B.1
-
7
-
-
84944038631
-
Automating data independence
-
Toulouse, France, October Springer Verlag
-
Philippa Broadfoot, Gavin Lowe, and Bill Roscoe. Automating Data Independence. In 6th European Symposium on Research in Computer Security (ESORICS 2000), Volume 1895 of Lecture Notes on Computer Science, pages 175-190, Toulouse, France, October 2000. Springer Verlag.
-
(2000)
6th European Symposium on Research in Computer Security (ESORICS 2000), Volume 1895 of Lecture Notes on Computer Science
, pp. 175-190
-
-
Broadfoot, P.1
Lowe, G.2
Roscoe, B.3
-
10
-
-
0003300896
-
Protocol specification and analysis in maude
-
N. Heintze and J. Wing, editors Indianapolis, Indiana, 25 June
-
Grit Denker, Jose Meseguer, and Carolyn Talcott. Protocol Specification and Analysis in Maude. In N. Heintze and J. Wing, editors, Proc. of Workshop on Formal Methods and Security Protocols, Indianapolis, Indiana, 25 June 1998.
-
(1998)
Proc. of Workshop on Formal Methods and Security Protocols
-
-
Denker, G.1
Meseguer, J.2
Talcott, C.3
-
11
-
-
0003515826
-
Undecidability of bounded security protocols
-
Trento, Italy, 5 July
-
N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Workshop on Formal Methods and Security Protocols (FMSP'99), Trento, Italy, 5 July 1999.
-
(1999)
Workshop on Formal Methods and Security Protocols (FMSP'99)
-
-
Durgin, N.A.1
Lincoln, P.D.2
Mitchell, J.C.3
Scedrov, A.4
-
16
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Larry C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2): 85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
17
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A.W. Roscoe and P.J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security, 7(2, 3): 147-190, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
|