-
4
-
-
20144372297
-
Embedding csp in pvs: An application to authentication protocols
-
Dutertre, B. and Schneider, S. (1997). Embedding csp in pvs: an application to authentication protocols. In tpHOL.
-
(1997)
TpHOL
-
-
Dutertre, B.1
Schneider, S.2
-
5
-
-
84891301416
-
An authentication protocol using one-way functions: A pvs analysis
-
Royal Holloway, University of London
-
Evans, N. and Schneider, S. A. (2001a). An authentication protocol using one-way functions: a pvs analysis. Technical report, Royal Holloway, University of London.
-
(2001)
Technical Report
-
-
Evans, N.1
Schneider, S.A.2
-
6
-
-
84891288865
-
A practical introduction to using CSP and PVS to prove authentication properties of security protocols
-
Royal Holloway, University of London
-
Evans, N. and Schneider, S. A. (2001b). A practical introduction to using CSP and PVS to prove authentication properties of security protocols. Technical report, Royal Holloway, University of London.
-
(2001)
Technical Report
-
-
Evans, N.1
Schneider, S.A.2
-
10
-
-
0002783180
-
Using one-way functions for authentication
-
Gong, L. (1989). Using one-way functions for authentication. Computer Communication Review, 19(5).
-
(1989)
Computer Communication Review
, vol.19
, Issue.5
-
-
Gong, L.1
-
16
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer, R., Meadows, C., and Millen, J. (1994). Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2).
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
17
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
Lowe, G. (1995). An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56, 56.
-
(1995)
Information Processing Letters
, vol.56
, pp. 56
-
-
Lowe, G.1
-
18
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
of LNCS. Springer
-
Lowe, G. (1996). Breaking and fixing the needham-schroeder public-key protocol using FDR,. In TACAS, volume 1055 of LNCS. Springer.
-
(1996)
TACAS
, vol.1055
-
-
Lowe, G.1
-
21
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
Meadows, C. (1992). Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1).
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
-
-
Meadows, C.1
-
23
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R. and Schroeder, M. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12).
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
24
-
-
0003524744
-
The PVS specification language
-
Computer Science Lab, SRI International
-
Owre, S., Shankar, N., and Rushby, J. (1993). The PVS specification language. Technical report, Computer Science Lab, SRI International.
-
(1993)
Technical Report
-
-
Owre, S.1
Shankar, N.2
Rushby, J.3
-
25
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security.
-
(1998)
Journal of Computer Security
-
-
Paulson, L.1
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM.
-
(1978)
Communications of the ACM
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
Ryan, P. and Schneider, S. (1998). An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters.
-
(1998)
Information Processing Letters
-
-
Ryan, P.1
Schneider, S.2
-
31
-
-
0003777431
-
-
Addison-Wesley
-
Ryan, P. Y. A., Schneider, S. A., Goldsmith, M. H., Lowe, G., and Roscoe, A. W. (2000). Modelling and Analysis of Security Protocols. Addison-Wesley.
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
Goldsmith, M.H.3
Lowe, G.4
Roscoe, A.W.5
|