-
1
-
-
0027678308
-
Authentication and Delegation with Smart-Cards
-
October
-
Martin Abadi, Michael Burrows, Charles Kaufman, and Butler Lampson. Authentication and Delegation with Smart-Cards. Science of Computer Programming, 21(2):93-113, October 1993.
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 93-113
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
3
-
-
0037421015
-
A new logic for electronic commerce protocols
-
Kamel Adi, Mourad Debbabi, and Mohamed Mejri. A new logic for electronic commerce protocols. Theoretical Computer Science, 29(3):223-283, 2003.
-
(2003)
Theoretical Computer Science
, vol.29
, Issue.3
, pp. 223-283
-
-
Adi, K.1
Debbabi, M.2
Mejri, M.3
-
4
-
-
19144369108
-
Programming Satan's computer
-
Computer Science Today
-
Ross Anderson and Roger M. Needham. Programming Satan's computer. In Computer Science Today, volume 1000 of Lecture Notes in Computer Science, pages 426-441, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1000
, pp. 426-441
-
-
Anderson, R.1
Needham, R.M.2
-
5
-
-
0037237984
-
Inductive verification of smartcard protocols
-
Giampaolo Bella. Inductive Verification of Smartcard Protocols. Journal of Computer Security, 11(1):87-132, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 87-132
-
-
Bella, G.1
-
6
-
-
35248878042
-
Verification of Cryptographic Protocols: Tagging Enforces Termination
-
Andrew D. Gordon, editor, Proceedings of FoSSaCS'03
-
Bruno Blanchet and Andreas Podelski. Verification of Cryptographic Protocols: Tagging Enforces Termination. In Andrew D. Gordon, editor, Proceedings of FoSSaCS'03, volume 2620 of Lecture Notes in Computer Science, pages 136-152, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
7
-
-
0025386404
-
A logic of authentication
-
Feb
-
Michael Burrows, Martin Abadi, and Roger M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, Feb 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
8
-
-
2642548302
-
Secure protocol composition
-
Proceedings of 19th Conference on Mathematical Foundations of Programming Semantics
-
Anupam Datta, A. Derek, John C. Mitchell, and Dusko Pavlovic. Secure protocol composition. In Proceedings of 19th Conference on Mathematical Foundations of Programming Semantics, volume 83 of Electronic Notes in Theoretical Computer Science, 2003.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.83
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
9
-
-
5644231064
-
Using temporal logics of knowledge in the formal verification of security protocols
-
July
-
Clare Dixon, M. Carmel Fernandez Gago, Michael Fisher, and Wiebe van der Hoek. Using Temporal Logics of Knowledge in the Formal Verification of Security Protocols. In Proceedings of TIME 2004, July 2004.
-
(2004)
Proceedings of TIME 2004
-
-
Dixon, C.1
Gago, M.C.F.2
Fisher, M.3
Van Hoek, W.D.4
-
12
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
Nancy A. Durgin, John C. Mitchell, and Dusko Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11(4):677-721, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.A.1
Mitchell, J.C.2
Pavlovic, D.3
-
13
-
-
0004170287
-
On the security of multi-party ping-pong protocols
-
Technion - Israel Institute of Technology
-
Shimon Even and Oded Goldreich. On the security of multi-party ping-pong protocols. Technical Report 285, Technion - Israel Institute of Technology, 1983.
-
(1983)
Technical Report
, vol.285
-
-
Even, S.1
Goldreich, O.2
-
14
-
-
0026900438
-
A logic for reasoning about security
-
Aug
-
Janice Glasgow, Glenn MacEwen, and Prakash Panangaden. A logic for reasoning about security. ACM Transactions on Computer Systems, 10(3):226-264, Aug 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
MacEwen, G.2
Panangaden, P.3
-
15
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society
-
Li Gong, Roger Needham, and Raphael Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
16
-
-
35248868917
-
Modeling adversaries in a logic for security protocol analysis
-
Formal Aspects of Security, First International Conference, FASec 2002
-
Joseph Y. Halpern and Riccardo Pucella. Modeling adversaries in a logic for security protocol analysis. In Formal Aspects of Security, First International Conference, FASec 2002, volume 2629 of Lecture Notes in Computer Science, pages 115-132, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2629
, pp. 115-132
-
-
Halpern, J.Y.1
Pucella, R.2
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public key protocol using FDR
-
Proceedings of TACAS'96
-
Gavin Lowe. Breaking and fixing the Needham-Schroeder public key protocol using FDR. In Proceedings of TACAS'96, volume 1055 of Lecture Notes in Computer Science, pages 147-166, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Gavin Lowe. Towards a completeness result for model checking of security protocols. Journal of computer security, 7:89-146, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 89-146
-
-
Lowe, G.1
-
22
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Roger M. Needham and Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
23
-
-
0025405980
-
A critique of the Burrows, Abadi and Needham logic
-
D. M. Nessett. A critique of the Burrows, Abadi and Needham logic. ACM Operating systems review, 24(2):35-38, 1990.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
24
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of computer security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
26
-
-
11944251803
-
Decidability of context-explicit security protocols
-
R. Ramanujam and S.P.Suresh. Decidability of context-explicit security protocols. Journal of Computer Security, 13(1):135-165, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 135-165
-
-
Ramanujam, R.1
Suresh, S.P.2
-
27
-
-
35248886574
-
Tagging makes secrecy decidable for unbounded nonces as well
-
Mumbai, India, December
-
R. Ramanujam and S.P. Suresh. Tagging makes secrecy decidable for unbounded nonces as well. In Proceedings of 23rd FST&TCS, volume 2914, pages 363-374, Mumbai, India, December 2003.
-
(2003)
Proceedings of 23rd FST&TCS
, vol.2914
, pp. 363-374
-
-
Ramanujam, R.1
Suresh, S.P.2
-
28
-
-
0037453396
-
Protocol insecurity with finite number of sessions is NP-complete
-
Michael Rusinowitch and Mathieu Turuani. Protocol insecurity with finite number of sessions is NP-complete. Theoretical Computer Science, 299:451-475, 2003.
-
(2003)
Theoretical Computer Science
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
29
-
-
11944274424
-
-
PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November. Madras University
-
S.P. Suresh. Foundations of Security Protocol Analysis. PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November 2003. Madras University. Available at http://www.cmi.ac.in/~spsuresh.
-
(2003)
Foundations of Security Protocol Analysis.
-
-
Suresh, S.P.1
|