-
2
-
-
35248899328
-
Cryptographically sound and machine-assisted verification of security protocols
-
Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), 2607 Springer
-
M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2607 of Lecture Notes in Computer Science, pages 675-686. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, pp. 675-686
-
-
Backes, M.1
Jacobi, C.2
-
3
-
-
84937407919
-
Deriving Cryptographically sound implementations using composition and formally verified bisimulation
-
Proc. 11th Symposium on Formal Methods Europe (FME 2002), Springer, 2002
-
M. Backes, C. Jacobi, and B. Pfitzmann. Deriving Cryptographically sound implementations using composition and formally verified bisimulation. In Proc. 11th Symposium on Formal Methods Europe (FME 2002), volume 2391 of Lecture Notes in Computer Science, pages 310-329. Springer, 2002.
-
Lecture Notes in Computer Science
, vol.2391
, pp. 310-329
-
-
Backes, M.1
Jacobi, C.2
Pfitzmann, B.3
-
4
-
-
84957037045
-
Computational probabilistic non-interference
-
Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
-
M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2502
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
5
-
-
84948731889
-
Polynomial fairness and liveness
-
M. Backes, B. Pfitzmann, M. Steiner, and M. Waidner. Polynomial fairness and liveness. In Proc. 15th IEEE Computer Security Foundations Workshop (CSFW), pages 160-174, 2002.
-
(2002)
Proc. 15th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 160-174
-
-
Backes, M.1
Pfitzmann, B.2
Steiner, M.3
Waidner, M.4
-
7
-
-
0037917924
-
An overview of SAL
-
S. Bensalem, V. Ganesh, Y. Lakhnech, C. Muñoz, S. Owre, H. Rueß, J. Rushby, V. Rusu, H. Saïdi, N. Shankar, E. Singerman, and A. Tiwari. An overview of SAL. In LFM 2000: Fifth NASA Langley Formal Methods Workshop, pages 187-196, 2000.
-
(2000)
LFM 2000: Fifth NASA Langley Formal Methods Workshop
, pp. 187-196
-
-
Bensalem, S.1
Ganesh, V.2
Lakhnech, Y.3
Muñoz, C.4
Owre, S.5
Rueß, H.6
Rushby, J.7
Rusu, V.8
Saïdi, H.9
Shankar, N.10
Singerman, E.11
Tiwari, A.12
-
12
-
-
0003843704
-
Communicating Sequential Processes
-
Prentice Hall, Kernel Hempstead
-
C. A. R. Hoare. Communicating Sequential Processes. International Series in Computer Science, Prentice Hall, Kernel Hempstead, 1985.
-
(1985)
International Series in Computer Science
-
-
Hoare, C.A.R.1
-
13
-
-
84948160653
-
Model checking for managers
-
Proc. Theoretical and Practical Aspects of SPIN Model Checking, Springer
-
W. Janssen, R. Mateescu, S. Mauw, P. Fennema, and P. van der Stappen. Model checking for managers. In Proc. Theoretical and Practical Aspects of SPIN Model Checking, volume 1680 of Lecture Notes in Computer Science, pages 92-107. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1680
, pp. 92-107
-
-
Janssen, W.1
Mateescu, R.2
Mauw, S.3
Fennema, P.4
Van Der Stappen, P.5
-
15
-
-
84957689522
-
A temporal logic for events and states
-
Proc. 19th International Conference on Application and Theory of Petri Nets, Springer
-
E. Kindler and T. Vesper. A temporal logic for events and states. In Proc. 19th International Conference on Application and Theory of Petri Nets, volume 1420 of Lecture Notes in Computer Science, pages 365-384. Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1420
, pp. 365-384
-
-
Kindler, E.1
Vesper, T.2
-
19
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Proc. 5th International Conference on the Unified Modeling Language, Springer
-
T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In Proc. 5th International Conference on the Unified Modeling Language, volume 2460 of Lecture Notes in Computer Science, pages 425-441. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2460
, pp. 425-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Springer
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0004215089
-
-
Morgan Kaufmann Publishers, San Francisco
-
N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
-
(1996)
Distributed Algorithms
-
-
Lynch, N.1
-
23
-
-
84944677742
-
PVS: A prototype verification system
-
Proc. 11th International Conference on Automated Deduction (CADE), springer
-
S. Owre, N. Shankar, and J. M. Rushby. PVS: A prototype verification system. In Proc. 11th International Conference on Automated Deduction (CADE), volume 607 of Lecture Notes in Computer Science, pages 748-752. springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.607
, pp. 748-752
-
-
Owre, S.1
Shankar, N.2
Rushby, J.M.3
-
24
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
-
(1998)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
25
-
-
0005076119
-
Cryptographic security of reactive systems
-
Electronic Notes in Theoretical Computer Science (ENTCS), March
-
B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic security of reactive systems. Presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), March 2000. http://www.elsevier.nl/cas/tree/store/tcs/free/noncas/pc/menu.htm.
-
(2000)
DERA/RHUL Workshop on Secure Architectures and Information Flow
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
26
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
-
(2001)
Proc. 22nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
28
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A. W. Roscoe and P. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, 7(2,3):147-190, 1998.
-
(1998)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.2
|