-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Foundations of Software Science and Computation Structures. Springer
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Foundations of Software Science and Computation Structures, volume 2030 of LNCS. Springer, 2001.
-
(2001)
LNCS
, vol.2030
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
35048864876
-
Automatic verification of time sensitive cryptographic protocols
-
K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems. Springer
-
G. Delzanno and P. Ganty. Automatic verification of time sensitive cryptographic protocols. In K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems, volume 2988 of LNCS, pages 342-356. Springer, 2004.
-
(2004)
LNCS
, vol.2988
, pp. 342-356
-
-
Delzanno, G.1
Ganty, P.2
-
8
-
-
84976665942
-
Timestamps in key distribution protocols
-
D.E. Denning and G.M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
9
-
-
84944070422
-
Analysing time dependent security properties in CSP using PVS
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, ESORICS. Springer
-
N. Evans and S. Schneider. Analysing time dependent security properties in CSP using PVS. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, ESORICS, volume 1895 of LNCS, pages 222-237. Springer, 2000.
-
(2000)
LNCS
, vol.1895
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
10
-
-
35248815623
-
Typing one-to-one and one-to-many correspondences in security protocols
-
Proc. Int. Software Security Symp. Springer-Verlag
-
A. D. Gordon and A.S.A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Proc. Int. Software Security Symp., volume 2609 of Lecture Notes in Computer Science, pages 263-282. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2609
, pp. 263-282
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
11
-
-
0141863341
-
Authenticity by typing for security protocols
-
A.D. Gordon and A.S.A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4):451-521, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
12
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A.D. Gordon and A.S.A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4):435-484, 2003.
-
(2003)
J. Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
13
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography and the pi-calculus
-
LNCS. Springer
-
A.D. Gordon and A.S.A. Jeffrey. Secrecy despite compromise: Types, cryptography and the pi-calculus. In CONCUR 2005: Concurrency Theory, LNCS. Springer, 2005.
-
(2005)
CONCUR 2005: Concurrency Theory
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
14
-
-
35248873844
-
A simple language for realtime cryptographic protocol analysis
-
P. Degano, editor, 12th European Symposium on Programming. Springer
-
R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for realtime cryptographic protocol analysis. In P. Degano, editor, 12th European Symposium on Programming, volume 2618 of LNCS, pages 114-128. Springer, 2003.
-
(2003)
LNCS
, vol.2618
, pp. 114-128
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
15
-
-
18944391675
-
Key compromise, strand spaces, and the authentication tests
-
Joshua D. Guttman. Key compromise, strand spaces, and the authentication tests. Electr. Notes Theor. Comput. Sci., 45, 2001.
-
(2001)
Electr. Notes Theor. Comput. Sci.
, vol.45
-
-
Guttman, J.D.1
-
16
-
-
84902449094
-
Pattern-matching spi-calculus
-
2nd IFIP Workshop on Formal Aspects in Security and Trust. Kluwer Academic Press
-
C. Haack and A.S.A. Jeffrey. Pattern-matching spi-calculus. In 2nd IFIP Workshop on Formal Aspects in Security and Trust, volume 173 of IFIP. Kluwer Academic Press, 2004.
-
(2004)
IFIP
, vol.173
-
-
Haack, C.1
Jeffrey, A.S.A.2
-
18
-
-
4944243609
-
A process algebra for timed systems
-
M. Hennessy and T. Regan. A process algebra for timed systems. Information and Computation, 117(2):221-239, 1995.
-
(1995)
Information and Computation
, vol.117
, Issue.2
, pp. 221-239
-
-
Hennessy, M.1
Regan, T.2
-
19
-
-
27244438198
-
A symbolic decision procedure for cryptographic protocols with time stamps
-
CONCUR 2004: Concurrency Theory. Springer
-
Y. Lakhnech L. Bozga, C. Ene. A symbolic decision procedure for cryptographic protocols with time stamps. In CONCUR 2004: Concurrency Theory, volume 3170 of LNCS, pages 177-192. Springer, 2004.
-
(2004)
LNCS
, vol.3170
, pp. 177-192
-
-
Lakhnech, Y.1
Bozga, L.2
Ene, C.3
-
20
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
21
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
|