-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. JACM, 46(5):749-786, 1999.
-
(1999)
JACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theor. Comput. Sci., 298(3):387-415, 2003.
-
(2003)
Theor. Comput. Sci.
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
84942246406
-
Automatic validation of protocol narration
-
IEEE Computer Society Press, June
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. R. Nielson. Automatic validation of protocol narration. In Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03), pages 126-140. IEEE Computer Society Press, June 2003.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03)
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
4
-
-
18444375514
-
Control flow analysis can find new flaws too
-
ENTCS. Elsevier
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. R. Nielson. Control flow analysis can find new flaws too. In Proceedings of the Workshop on Issues on the Theory of Security (WITS'04), ENTCS. Elsevier, 2004.
-
(2004)
Proceedings of the Workshop on Issues on the Theory of Security (WITS'04)
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
6
-
-
21144444143
-
Compositional analysis of authentication protocols
-
Proceedings of European Symposium on Programming (ESOP 2004). Springer-Verlag
-
M. Bugliesi, R. Focardi, and M. Maffei. Compositional analysis of authentication protocols. In Proceedings of European Symposium on Programming (ESOP 2004), volume 2986 of Lecture Notes in Computer Science, pages 140-154. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
8
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security. 11(4):677-721, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
9
-
-
28144448905
-
Inferring authentication tags
-
January, ACM SIGPLAN and GI FoMSESS Workshop on Issues on the Theory of Security (WITS 2005)
-
R. Focardi, M. Maffei, and F. Placella. Inferring authentication tags. January 2005. In ACM Digital Library Proceedings of IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues on the Theory of Security (WITS 2005).
-
(2005)
ACM Digital Library Proceedings of IFIP WG 1.7
-
-
Focardi, R.1
Maffei, M.2
Placella, F.3
-
11
-
-
28144442101
-
-
Personal communication. January
-
A. Gordon and A. Jeffrey. Personal communication. January 2005.
-
(2005)
-
-
Gordon, A.1
Jeffrey, A.2
-
12
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.1
Jeffrey, A.2
-
13
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. J. Comput. Secur., 11(4):451-519, 2004.
-
(2004)
J. Comput. Secur.
, vol.11
, Issue.4
, pp. 451-519
-
-
Gordon, A.D.1
Jeffrey, A.2
|