-
1
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21 (1978) 993-999
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
2
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8 (1990) 18-36
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer Verlag
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Proceedings of TACAS. Volume 1055., Springer Verlag (1996) 147-166
-
(1996)
Proceedings of TACAS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
6
-
-
0036768550
-
A hierarchy of communication models for message sequence charts
-
Engels, A.G., Mauw, S., Reniers, M.: A hierarchy of communication models for Message Sequence Charts. Science of Computer Programming 44 (2002) 253-292
-
(2002)
Science of Computer Programming
, vol.44
, pp. 253-292
-
-
Engels, A.G.1
Mauw, S.2
Reniers, M.3
-
7
-
-
0003931061
-
A structural approach to operational semantics
-
Computer Science Department, Aarhus University
-
Plotkin, G.: A structural approach to operational semantics. Technical Report DIAMI FN-19, Computer Science Department, Aarhus University (1981)
-
(1981)
Technical Report
, vol.DIAMI FN-19
-
-
Plotkin, G.1
-
8
-
-
23144444378
-
Defining authentication in a trace model
-
Dimitrakos, T., Martinelli, F., eds.: FAST 2003. Pisa, IITT-CNR technical report
-
Cremers, C., Mauw, S., de Vink, E.: Defining authentication in a trace model. In Dimitrakos, T., Martinelli, F., eds.: FAST 2003. Proceedings of the first international Workshop on Formal Aspects in Security and Trust, Pisa, IITT-CNR technical report (2003) 131-145
-
(2003)
Proceedings of the First International Workshop on Formal Aspects in Security and Trust
, pp. 131-145
-
-
Cremers, C.1
Mauw, S.2
De Vink, E.3
-
10
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE
-
Lowe, G.: Casper: A compiler for the analysis of security protocols. In: Proc. 10th Computer Security Foundations Workshop, IEEE (1997) 18-30
-
(1997)
Proc. 10th Computer Security Foundations Workshop
, pp. 18-30
-
-
Lowe, G.1
-
12
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland, California
-
Thayer Fábrega, F., Herzog, J., Guttman, J.: Strand spaces: Why is a security protocol correct? In: Proc. 1998 IEEE Symposium on Security and Privacy, Oakland, California (1998) 66-77
-
(1998)
Proc. 1998 IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Fábrega, T.1
Herzog, F.2
Guttman, J.3
-
13
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. Inf. Comput. 148 (1999) 1-70
-
(1999)
Inf. Comput.
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
14
-
-
44049113210
-
A calculus of mobile processes, i
-
Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, i. Inf. Comput. 100 (1992) 1-40
-
(1992)
Inf. Comput.
, vol.100
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
15
-
-
0037076872
-
Primitives for authentication in process algebras
-
Bodei, C., Degano, P., Focardi, R., Priami, C.: Primitives for authentication in process algebras. Theor. Comput. Sci. 283 (2002) 271-304
-
(2002)
Theor. Comput. Sci.
, vol.283
, pp. 271-304
-
-
Bodei, C.1
Degano, P.2
Focardi, R.3
Priami, C.4
-
16
-
-
0037209815
-
Analysis of security protocols as open systems
-
Martinelli, F.: Analysis of security protocols as open systems. Theor. Comput. Sci. 290 (2003) 1057-1106
-
(2003)
Theor. Comput. Sci.
, vol.290
, pp. 1057-1106
-
-
Martinelli, F.1
-
17
-
-
24944551065
-
Checking secrecy by means of partial order reduction
-
Amyot, D., Williams, A., eds.: SAM 2004: Security Analysis and Modelling, Ottawa, Canada, Springer-Verlag, Berlin
-
Cremers, C., Mauw, S.: Checking secrecy by means of partial order reduction. In Amyot, D., Williams, A., eds.: SAM 2004: Security Analysis and Modelling. Volume LNCS 3319 of Proceedings of the fourth SDL and MSC Workshop., Ottawa, Canada, Springer-Verlag, Berlin (2004) 177-194
-
(2004)
Proceedings of the Fourth SDL and MSC Workshop
, vol.LNCS 3319
, pp. 177-194
-
-
Cremers, C.1
Mauw, S.2
|