-
1
-
-
84863900858
-
Mechanizing BAN Kerberos by the inductive method
-
A. J. Hu and M. Y. Vardi, editors, Vancouver, B.C., Canada, June Springer-Verlag LNCS 1427
-
G. Bella and L. G. Paulson. Mechanizing BAN Kerberos by the inductive method. In A. J. Hu and M. Y. Vardi, editors, Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98), pages 416-427, Vancouver, B.C., Canada, June 1998. Springer-Verlag LNCS 1427.
-
(1998)
Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98)
, pp. 416-427
-
-
Bella, G.1
Paulson, L.G.2
-
2
-
-
31744449038
-
On the existence of an effective and complete proof system for bounded security protocols
-
LNCS
-
L. Bozga, C. Ene, and Y. Lakhnech. On the existence of an effective and complete proof system for bounded security protocols. In FOSSACS, vol. 2987. LNCS, 2004.
-
(2004)
FOSSACS
, vol.2987
-
-
Bozga, L.1
Ene, C.2
Lakhnech, Y.3
-
8
-
-
84944070422
-
Analyzing time dependent security properties in CSP using PVS
-
Neil Evans and Steve Schneider. Analyzing time dependent security properties in CSP using PVS. In ESORICS, pages 222-237, 2000.
-
(2000)
ESORICS
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
9
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
Washington - Brussels - Tokyo, June IEEE
-
M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In 14th IEEE Computer Security Foundations Workshop (CSFW '01), pages 160-173, Washington - Brussels - Tokyo, June 2001. IEEE.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW '01)
, pp. 160-173
-
-
Fiore, M.1
Abadi, M.2
-
10
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
Li Gong. A security risk of depending on synchronized clocks. Operating Systems Review, 26(1):49-53, 1992.
-
(1992)
Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
11
-
-
1442311382
-
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
-
Roberto Gorrieri and Fabio Martinelli. A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Science of Computer Programming, 50(1-3):23-49, 2004.
-
(2004)
Science of Computer Programming
, vol.50
, Issue.1-3
, pp. 23-49
-
-
Gorrieri, R.1
Martinelli, F.2
-
12
-
-
0002692684
-
Solving equations in abstract algebras: A rule-based survey of unification
-
Jean-Louis Lassez and Gordon Plotkin, editors, MIT-Press
-
J.-P. Jouannaud and C. Kirchner. Solving equations in abstract algebras: A rule-based survey of unification. In Jean-Louis Lassez and Gordon Plotkin, editors, Computational Logic: Essays in Honor of Alan Robinson. MIT-Press, 1991.
-
(1991)
Computational Logic: Essays in Honor of Alan Robinson
-
-
Jouannaud, J.-P.1
Kirchner, C.2
-
13
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR
-
LNCS
-
G. Lowe. Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of LNCS, pages 147-166, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
|