-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
2
-
-
0003092378
-
-
Expanded version available as January
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
-
(1998)
SRC Research Report
, vol.149
-
-
-
5
-
-
2642523732
-
Environmental requirements for authentication protocols
-
Springer-Verlag
-
R. Canetti, C. Meadows, and P. Syverson. Environmental requirements for authentication protocols. In Proceedings of Software Security - Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS, LNCS 2609, pages 339-355. Springer-Verlag, 2003.
-
(2003)
Proceedings of Software Security - Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS, LNCS
, vol.2609
, pp. 339-355
-
-
Canetti, R.1
Meadows, C.2
Syverson, P.3
-
6
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
IEEE
-
A. Datta, A. Derek, J. G. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization. In Proceedings of 16th IEEE Computer Security Foundations Workshop, pages 109-125. IEEE, 2003.
-
(2003)
Proceedings of 16th IEEE Computer Security Foundations Workshop
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.G.3
Pavlovic, D.4
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
11
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland, CA, May. IEEE Computer Society Press
-
F. J. T. Fábrega, J. C. Herzog, and J. D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 160-171, Oakland, CA, May 1998. IEEE Computer Society Press.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
14
-
-
0003272021
-
The internet key exchange (IKE)
-
D. Harkins and D. Carrel. The Internet Key Exchange (IKE), 1998. RFC 2409.
-
(1998)
RFC
, vol.2409
-
-
Harkins, D.1
Carrel, D.2
-
15
-
-
0001924088
-
A model for secure protocols and their composition
-
January
-
N. Heintze and J. D. Tygar. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
16
-
-
0038629629
-
Entity authentication mechanisms - Part 3: Entity authentication using asymmetric techniques
-
ISO/IEC
-
IEEE. Entity authentication mechanisms - part 3: Entity authentication using asymmetric techniques. Technical report ISO/IEC IS 9798-3, ISO/IEC, 1993.
-
(1993)
Technical Report
, vol.ISO-IEC IS 9798-3
-
-
-
21
-
-
0036083020
-
On the composition of secure systems
-
Oakland, CA, USA, May 12-15. IEEE Computer Society
-
H. Mantel. On the Composition of Secure Systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 88-101, Oakland, CA, USA, May 12-15 2002. IEEE Computer Society.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 88-101
-
-
Mantel, H.1
-
22
-
-
0023829319
-
Noninterference and the composability of security properties
-
Oakland, CA, USA, May. IEEE Computer Society
-
D. McCullough. Noninterference and the composability of security properties. In Proceedings of the IEEE Symposium on Security and Privacy, pages 177-186, Oakland, CA, USA, May 1988. IEEE Computer Society.
-
(1988)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
25
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" properties
-
J. McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
27
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
30
-
-
0141546693
-
Action structures
-
Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December
-
R. Milner. Action structures. LFCS report ECS-LFCS-92-249, Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December 1992.
-
(1992)
LFCS Report
, vol.ECS-LFCS-92-249
-
-
Milner, R.1
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
34
-
-
85013569711
-
Categorical logic of names and abstraction in action calculi
-
D. Pavlovic. Categorical logic of names and abstraction in action calculi. Math. Structures in Comp. Sci., 7(6):619-637, 1997.
-
(1997)
Math. Structures in Comp. Sci.
, vol.7
, Issue.6
, pp. 619-637
-
-
Pavlovic, D.1
-
36
-
-
0001937830
-
A formal language for cryptographic protocol requirements
-
P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes and Cryptography, 7(1-2):27-59, 1996.
-
(1996)
Designs, Codes and Cryptography
, vol.7
, Issue.1-2
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
|