-
1
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society
-
B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 2001, pp. 82-96.
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
2
-
-
1242331182
-
From secrecy to authenticity in security protocols
-
Springer-Verlag
-
B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium, Springer-Verlag, 2002, pp. 242-259.
-
(2002)
9th International Static Analysis Symposium
, pp. 242-259
-
-
Blanchet, B.1
-
5
-
-
84944038631
-
Automating data independence
-
Springer
-
P.J. Broadfoot, G. Lowe and A.W. Roscoe, Automating data independence, in: 6th European Symposium on Research in Computer Security, Volume 1895 of LNCS, Springer, 2000, pp. 175-190.
-
(2000)
6th European Symposium on Research in Computer Security, Volume 1895 of LNCS
, vol.1895
, pp. 175-190
-
-
Broadfoot, P.J.1
Lowe, G.2
Roscoe, A.W.3
-
6
-
-
26444446875
-
Capturing parallel attacks within the data independence framework
-
IEEE Computer Society
-
P.J. Broadfoot and A.W. Roscoe, Capturing parallel attacks within the data independence framework, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 2002, pp. 147-159.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 147-159
-
-
Broadfoot, P.J.1
Roscoe, A.W.2
-
8
-
-
0003568551
-
A survey of authentication protocol literature: Version 1.0
-
University of York
-
J.A. Clark and J.L. Jacob, A survey of authentication protocol literature: Version 1.0, Technical report, University of York, 1997.
-
(1997)
Technical Report
-
-
Clark, J.A.1
Jacob, J.L.2
-
13
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security 6 (1998), 53-84.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
14
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows, The NRL Protocol Analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
16
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998).
-
(1998)
Journal of Computer Security
, vol.6
-
-
Paulson, L.1
-
17
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J.D. Tygar and D.X. Song, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, 2000, pp. 56-73.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.X.4
-
18
-
-
0031634193
-
Proving security protocols with model checkers by data independence techniques
-
A.W. Roscoe, Proving security protocols with model checkers by data independence techniques, in: 11th IEEE Computer Security Foundations Workshop, 1998, pp. 84-95.
-
(1998)
11th IEEE Computer Security Foundations Workshop
, pp. 84-95
-
-
Roscoe, A.W.1
-
20
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A.W. Roscoe and P.J. Broadfoot, Proving security protocols with model checkers by data independence techniques, Journal of Computer Security 7(2,3) (1999), pp. 147-190.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
21
-
-
0003777431
-
-
Pearson Education
-
P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe and A.W. Roscoe, Modelling and Analysis of Security Protocols, Pearson Education, 2001.
-
(2001)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
Goldsmith, M.H.3
Lowe, G.4
Roscoe, A.W.5
-
23
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D.X. Song, S. Berezin and A. Perrig, Athena: A novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1,2) (2001), 47-74.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
-
24
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
Springer-Verlag
-
M. Tatebayashi, N. Matsuzaki and D.B. Newman, Key distribution protocol for digital mobile communication systems, in: Advances in Cryptology: Proceedings of Crypto'89, Volume 435 of LNCS, Springer-Verlag, 1990, pp. 324-333.
-
(1990)
Advances in Cryptology: Proceedings of Crypto'89, Volume 435 of LNCS
, vol.435
, pp. 324-333
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
|