-
1
-
-
0027969914
-
Prudent engineering practice for cryptographic protocols
-
IEEE Computer Society Press
-
M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, in: Proceedings, 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1994, pp. 122-136.
-
(1994)
Proceedings, 1994 IEEE Symposium on Research in Security and Privacy
, pp. 122-136
-
-
Abadi, M.1
Needham, R.2
-
2
-
-
33750247207
-
Verifying the SET purchase protocols
-
Cambridge University Computer Laboratory
-
G. Bella, F. Massacci and L.C. Paulson, Verifying the SET purchase protocols. Technical report, Cambridge University Computer Laboratory, 2001. Short version appeared in International Joint Conference on Automated Reasoning, 2001. Available at http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html.
-
(2001)
Technical Report
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
3
-
-
3042641705
-
-
Short version appeared
-
G. Bella, F. Massacci and L.C. Paulson, Verifying the SET purchase protocols. Technical report, Cambridge University Computer Laboratory, 2001. Short version appeared in International Joint Conference on Automated Reasoning, 2001. Available at http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html.
-
(2001)
International Joint Conference on Automated Reasoning
-
-
-
4
-
-
0005078946
-
Entity authentication and key distribution
-
Springer-Verlag
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto'93 Proceedings, Springer-Verlag, 1993. Full version available at http://www-cse.ucsd.edu/users/mihir/papers/eakd.ps.
-
(1993)
Advances in Cryptology - Crypto'93 Proceedings
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
P. Samarati, ed., New York, ACM Press
-
R. Chadha, M. Kanovich and A. Scedrov, Inductive methods and contract-signing protocols, in: Proceedings, 8th ACM Conference on Computer and Communications Security, P. Samarati, ed., New York, ACM Press, 2001, pp. 176-185.
-
(2001)
Proceedings, 8th ACM Conference on Computer and Communications Security
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.2
Scedrov, A.3
-
11
-
-
18444377006
-
Security goals: Packet trajectories and strand spaces
-
Foundations of Security Analysis and Design, R. Gorrieri and R. Focardi, eds, Springer-Verlag
-
J.D. Guttman, Security goals: Packet trajectories and strand spaces, in: Foundations of Security Analysis and Design, R. Gorrieri and R. Focardi, eds, Volume 2171 of LNCS, Springer-Verlag, 2001, pp. 197-261.
-
(2001)
LNCS
, vol.2171
, pp. 197-261
-
-
Guttman, J.D.1
-
12
-
-
3042635426
-
The faithfulness of abstract protocol analysis: Message authentication
-
Forthcoming
-
J.D. Guttman, F.J. Thayer and L.D. Zuck, The faithfulness of abstract protocol analysis: Message authentication, Journal of Computer Security (2003) (Forthcoming).
-
(2003)
Journal of Computer Security
-
-
Guttman, J.D.1
Thayer, F.J.2
Zuck, L.D.3
-
17
-
-
0344875574
-
Analyzing protocols subject to guessing attacks
-
G. Lowe, Analyzing protocols subject to guessing attacks, Journal of Computer Security 12(1) (2004), 83-97.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 83-97
-
-
Lowe, G.1
-
18
-
-
0037251070
-
Posets and protocols: Picking the right three-party protocol
-
S.-L. Ng, Posets and protocols: Picking the right three-party protocol, IEEE Journal on Selected Areas in Communication (January) (2003), 55-61.
-
(2003)
IEEE Journal on Selected Areas in Communication
, Issue.JANUARY
, pp. 55-61
-
-
Ng, S.-L.1
-
19
-
-
0033682447
-
Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
-
IEEE Computer Society Press
-
A. Perrig and D.X. Song, Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000.
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
-
-
Perrig, A.1
Song, D.X.2
-
21
-
-
0032678887
-
Athena: A new efficient automated checker for security protocol analysis
-
IEEE Computer Society Press
-
D.X. Song, Athena: a new efficient automated checker for security protocol analysis, in: Proceedings of the 12th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop
-
-
Song, D.X.1
-
22
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F.J. Thayer Fábrega, J.C. Herzog and J.D. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2/3) (1999), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer Fábrega, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
23
-
-
0026630927
-
Authentication for distributed systems
-
T.Y.C. Woo and S.S. Lam, Authentication for distributed systems, Computer 25(1) (1992), 39-52.
-
(1992)
Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
24
-
-
0002508587
-
A lesson on authentication protocol design
-
T.Y.C. Woo and S.S. Lam, A lesson on authentication protocol design, Operating Systems Review, 1994, pp. 24-37.
-
(1994)
Operating Systems Review
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|