-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet, Secrecy types for asymmetric communication, Theoretical Computer Science 298(3) (2003), 387-415.
-
(2003)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
5
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A.D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148 (1999), 1-70.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
Springer
-
B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium (SAS'02), Volume 2477 of Lecture Notes in Computer Science, Springer, 2002, pp. 242-259.
-
(2002)
9th International Static Analysis Symposium (SAS'02), Volume 2477 of Lecture Notes in Computer Science
, vol.2477
, pp. 242-259
-
-
Blanchet, B.1
-
9
-
-
84955619856
-
Typed MSR: Syntax and examples
-
Springer
-
I. Cervesato, Typed MSR: Syntax and examples, in: First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Volume 2052 of Lecture Notes in Computer Science, Springer, 2001, pp. 159-177.
-
(2001)
First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Volume 2052 of Lecture Notes in Computer Science
, vol.2052
, pp. 159-177
-
-
Cervesato, I.1
-
12
-
-
0034834930
-
A compositional logic for protocol correctness
-
IEEE Computer Society Press
-
N. Durgin, J.C. Mitchell and D. Pavlovic, A compositional logic for protocol correctness, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2001, pp. 241-255.
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 241-255
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
14
-
-
0034835462
-
Authenticity by typing for security protocols
-
IEEE Computer Society Press
-
A.D. Gordon and A. Jeffrey, Authenticity by typing for security protocols, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2001, pp. 145-159. Extended version to appear in J. Computer Security.
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 145-159
-
-
Gordon, A.D.1
Jeffrey, A.2
-
15
-
-
0034835462
-
-
Extended version to appear
-
A.D. Gordon and A. Jeffrey, Authenticity by typing for security protocols, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2001, pp. 145-159. Extended version to appear in J. Computer Security.
-
J. Computer Security
-
-
-
16
-
-
25944460630
-
Types and effects for asymmetric cryptographic protocols
-
Microsoft Research, August
-
A.D. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, Technical Report MSR-TR-2002-31, Microsoft Research, August, 2002.
-
(2002)
Technical Report
, vol.MSR-TR-2002-31
-
-
Gordon, A.D.1
Jeffrey, A.2
-
17
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
IEEE Computer Society Press
-
A.D. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2002, pp. 77-91.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 77-91
-
-
Gordon, A.D.1
Jeffrey, A.2
-
18
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
A.D. Gordon and A. Jeffrey, Typing correspondence assertions for communication protocols, Theoretical Computer Science 300 (2003), 379-409.
-
(2003)
Theoretical Computer Science
, vol.300
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
19
-
-
3042597797
-
Validating a web service security abstraction by typing
-
ACM Press
-
A.D. Gordon and R. Pucella, Validating a web service security abstraction by typing, in: 2002 ACM Workshop on XML Security, ACM Press, 2002, pp. 62-73. An extended version appears as Technical Report MSR-TR-2002-108, Microsoft Research, December, 2002.
-
(2002)
2002 ACM Workshop on XML Security
, pp. 62-73
-
-
Gordon, A.D.1
Pucella, R.2
-
20
-
-
0003610530
-
-
An extended version appears, Microsoft Research, December
-
A.D. Gordon and R. Pucella, Validating a web service security abstraction by typing, in: 2002 ACM Workshop on XML Security, ACM Press, 2002, pp. 62-73. An extended version appears as Technical Report MSR-TR-2002-108, Microsoft Research, December, 2002.
-
(2002)
Technical Report
, vol.MSR-TR-2002-108
-
-
-
21
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J.D. Guttman and F.J. Thayer, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
23
-
-
0033683607
-
Towards automatic verification of authentication protocols on an unbounded network
-
IEEE Computer Society Press
-
J. Heather and S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000, pp. 132-143.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 132-143
-
-
Heather, J.1
Schneider, S.2
-
24
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
Springer
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, Volume 1055 of Lecture Notes in Computer Science, Springer, 1996, pp. 147-166.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems, Volume 1055 of Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
25
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press
-
G. Lowe, A hierarchy of authentication specifications, in: 10th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1997, pp. 31-43.
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
-
26
-
-
0003515838
-
Model checking for security protocols
-
W. Marrero, E.M. Clarke and S. Jha, Model checking for security protocols, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997. Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May, 1997.
-
(1997)
DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Marrero, W.1
Clarke, E.M.2
Jha, S.3
-
27
-
-
0003610530
-
-
Preliminary version appears as, Carnegie Mellon University, May
-
W. Marrero, E.M. Clarke and S. Jha, Model checking for security protocols, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997. Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May, 1997.
-
(1997)
Technical Report
, vol.TR-CMU-CS-97-139
-
-
-
29
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
31
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998), 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
32
-
-
0035072287
-
Athena, a novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin and A. Perrig, Athena, a novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1,2) (2001), 47-74.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
|