-
1
-
-
84957668700
-
Secrecy by typing in security protocols
-
Theoretical aspects of computer software. Springer, Berlin Heidelberg New York
-
Abadi M (1997) Secrecy by typing in security protocols. In: Theoretical aspects of computer software. Lecture notes in computer science, vol 1281. Springer, Berlin Heidelberg New York, pp 611-638
-
(1997)
Lecture Notes in Computer Science
, vol.1281
, pp. 611-638
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Foundations of software science and computation structures. Springer, Berlin Heidelberg New York
-
Abadi M, Blanchet B (2001) Secrecy types for asymmetric communication. In: Foundations of software science and computation structures. Lecture notes in computer science, vol 2030. Springer, Berlin Heidelberg New York, pp 25-41
-
(2001)
Lecture Notes in Computer Science
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao model
-
CONCUR: 13th international conference on concurrency theory. Springer, Berlin Heidelberg New York
-
Amadio RM, Charatonik W (2002) On name generation and set-based analysis in the Dolev-Yao model. In: CONCUR: 13th international conference on concurrency theory. Lecture notes in computer science, vol 2421. Springer, Berlin Heidelberg New York
-
(2002)
Lecture Notes in Computer Science
, vol.2421
-
-
Amadio, R.M.1
Charatonik, W.2
-
5
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
International conference on concurrency theory. Springer, Berlin Heidelberg New York
-
Amadio RM, Lugiez D (2000) On the reachability problem in cryptographic protocols. In: International conference on concurrency theory. Lecture notes in computer science, vol 1877. Springer, Berlin Heidelberg New York, pp 380-394
-
(2000)
Lecture Notes in Computer Science
, vol.1877
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
7
-
-
24644497304
-
Abstracting cryptographic protocols by prolog rules
-
International Symposium on static analysis. Springer, Berlin Heidelberg New York
-
Blanchet B (2001) Abstracting cryptographic protocols by prolog rules. In: International Symposium on static analysis. Lecture notes in computer science, vol 2126. Springer, Berlin Heidelberg New York, pp 433-436
-
(2001)
Lecture Notes in Computer Science
, vol.2126
, pp. 433-436
-
-
Blanchet, B.1
-
9
-
-
31744452138
-
Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols
-
International conference on computer-aided verification. Springer, Berlin Heidelberg New York
-
Bolignano D (1998) Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols. In: International conference on computer-aided verification. Lecture notes in computer science, vol 1427. Springer, Berlin Heidelberg New York, pp 77-87
-
(1998)
Lecture Notes in Computer Science
, vol.1427
, pp. 77-87
-
-
Bolignano, D.1
-
10
-
-
35048883478
-
On the existence of an effective and complete proof system for bounded security protocols
-
FOSSACS. Springer, Berlin Heidelberg New York
-
Bozga L, Ene C, Lakhnech Y (2004) On the existence of an effective and complete proof system for bounded security protocols. In: FOSSACS. Lecture notes in computer science, vol 2987. Springer, Berlin Heidelberg New York
-
(2004)
Lecture Notes in Computer Science
, vol.2987
-
-
Bozga, L.1
Ene, C.2
Lakhnech, Y.3
-
11
-
-
31744438276
-
A symbolic decision procedure for bounded security protocols with time stamps
-
Technical report, Verimag, Gières, France
-
Bozga L, Ene C, Lakhnech Y (2004) A symbolic decision procedure for bounded security protocols with time stamps. Technical report, Verimag, Gières, France
-
(2004)
-
-
Bozga, L.1
Ene, C.2
Lakhnech, Y.3
-
14
-
-
35248897454
-
Tree automata with one memory, set constraints, and ping-pong protocols
-
International colloquium on automata, languages and programming. Springer, Berlin Heidelberg New York
-
Comon H, Cortier V, Mitchell J (2001) Tree automata with one memory, set constraints, and ping-pong protocols. In: International colloquium on automata, languages and programming. Lecture notes in computer science, vol 2076. Springer, Berlin Heidelberg New York
-
(2001)
Lecture Notes in Computer Science
, vol.2076
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
15
-
-
14844290049
-
Is it possible to decide whether a cryptographic protocol is secure or not?
-
Comon H, Shmatikov V (2002) Is it possible to decide whether a cryptographic protocol is secure or not? J Telecommun Inf Technol 4:5-15
-
(2002)
J Telecommun Inf Technol
, vol.4
, pp. 5-15
-
-
Comon, H.1
Shmatikov, V.2
-
16
-
-
1442311384
-
Security properties: Two agents are sufficient
-
Comon-Lundh H, Cortier V (2004) Security properties: Two agents are sufficient. Sci Comput Programm 50(1-3):51-71
-
(2004)
Sci Comput Programm
, vol.50
, Issue.1-3
, pp. 51-71
-
-
Comon-Lundh, H.1
Cortier, V.2
-
18
-
-
0020720357
-
On the security of public key protocols
-
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198-208
-
(1983)
IEEE Trans Inf Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
20
-
-
0004170287
-
On the security of multi-party ping pong protocols
-
Technical report, Israel Institute of Technology
-
Even S, Goldreich O (1983) On the security of multi-party ping pong protocols. Technical report, Israel Institute of Technology
-
(1983)
-
-
Even, S.1
Goldreich, O.2
-
22
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
International conference on automated deduction. Springer, Berlin Heidelberg New York
-
Genet T, Klay F (2000) Rewriting for cryptographic protocol verification. In: International conference on automated deduction. Lecture notes in computer science, vol 1831. Springer, Berlin Heidelberg New York
-
(2000)
Lecture Notes in Computer Science
, vol.1831
-
-
Genet, T.1
Klay, F.2
-
24
-
-
84876354671
-
A method for automatic cryptographic protocol verification
-
International workshop on formal methods for parallel programming: theory and applications. Springer, Berlin Heidelberg New York
-
Goubault-Larrecq J (2000) A method for automatic cryptographic protocol verification. In: International workshop on formal methods for parallel programming: Theory and applications. Lecture notes in computer science, vol 1800. Springer, Berlin Heidelberg New York
-
(2000)
Lecture Notes in Computer Science
, vol.1800
-
-
Goubault-Larrecq, J.1
-
25
-
-
31744439819
-
Automatic verification of confidentiality properties of cryptographic program
-
El Khadi N (2001) Automatic verification of confidentiality properties of cryptographic program. Netw Inf Syst J 6:4-15
-
(2001)
Netw Inf Syst J
, vol.6
, pp. 4-15
-
-
El Khadi, N.1
-
26
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentification protocol
-
Lowe G (1995) An attack on the Needham-Schroeder public-key authentification protocol. Inf Process Lett 56(3):131-133
-
(1995)
Inf Process Lett
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
27
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR
-
Tools and algorithms for the construction and analysis of systems. Springer, Berlin Heidelberg New York
-
Lowe G (1996) Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR. In: Tools and algorithms for the construction and analysis of systems. Lecture notes in computer science, vol 1055. Springer, Berlin Heidelberg New York, pp 147-166
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
28
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
Washington Brussels Tokyo, June 1997
-
Lowe G (1997) Casper: A compiler for the analysis of security protocols. In: 10th IEEE workshop on computer security foundations (CSFW '97), Washington Brussels Tokyo, June 1997, pp 18-30
-
(1997)
10th IEEE Workshop on Computer Security Foundations (CSFW '97)
, pp. 18-30
-
-
Lowe, G.1
-
29
-
-
0033682446
-
Invariant generation techniques in cryptographic protocol analysis
-
Meadows C (2000) Invariant generation techniques in cryptographic protocol analysis. In: Workshop on computer security foundations
-
(2000)
Workshop on Computer Security Foundations
-
-
Meadows, C.1
-
32
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
Symposium on static analysis. Springer, Berlin Heidelberg New York
-
Monniaux D (1999) Abstracting cryptographic protocols with tree automata. In: Symposium on static analysis. Lecture notes in computer science, vol 1694. Springer, Berlin Heidelberg New York, pp 149-163
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 149-163
-
-
Monniaux, D.1
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993-999
-
(1978)
Commun ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
37
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
International conference on automated deduction. Springer, Berlin Heidelberg New York
-
Weidenbach C (1999) Towards an automatic analysis of security protocols in first-order logic. In: International conference on automated deduction. Lecture notes in computer science, vol 1632. Springer, Berlin Heidelberg New York, pp 314-328
-
(1999)
Lecture Notes in Computer Science
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|