-
1
-
-
0004215976
-
A Logic of Authentication
-
Digital System Research Center
-
M. Burrows, M. Abadi and R. Needham. A Logic of Authentication. Technical Report 39, Digital System Research Center, 1989.
-
(1989)
Technical Report
, vol.39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
35248852076
-
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis
-
M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Springer-Verlag
-
I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell and A. Scedrov. A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Lecture Notes in Computer Science, Hot Topics, vol.2609, Springer-Verlag, pp.356-382, 2003.
-
(2003)
Lecture Notes in Computer Science, Hot Topics
, vol.2609
, pp. 356-382
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
4
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell and A. Scedrov. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, vol.12, no.l, pp.677-722, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.50
, pp. 677-722
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
7
-
-
24144437949
-
Secure Protocol Composition
-
A. Datta, A. Derek, J. C. Mitchell and D. Pavlovic. Secure Protocol Composition. Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics, ENTCS Vol. 83, 2004.
-
(2004)
Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics, ENTCS
, vol.83
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
9
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. C. van Oorschot and M. J. Wiener. Authentication and authenticated key exchange Designs, Codes and Cryptography, vol.2, pp.107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
11
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, vol.11, no.4, pp.677-721, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
13
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J. D. Guttman and F. J. T. Fdbrega. Authentication tests and the structure of bundles. Theoretical Computer Science, vol. 283(2), pp.333-380, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Fdbrega, F.J.T.2
-
14
-
-
35048859061
-
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic
-
M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Springer-Verlag
-
K. Hasebe and M. Okada. A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Lecture Notes in Computer Science, Hot Topics, vol.2609, Springer-Verlag, pp.417-440, 2003.
-
(2003)
Lecture Notes in Computer Science, Hot Topics
, vol.2609
, pp. 417-440
-
-
Hasebe, K.1
Okada, M.2
-
16
-
-
0038629629
-
Entity Authentication Mechanisms - Part 3: Entity Authentication Using Asymmetric Techniques
-
ISO/IEC
-
IEEE. Entity Authentication Mechanisms - part 3: Entity Authentication Using Asymmetric Techniques. Technical report ISO/IEC IS 9798-3, ISO/IEC, 1993.
-
(1993)
Technical Report
, vol.ISO-IEC IS 9798-3
-
-
|