-
2
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R. M., Schroeder M. D.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993-999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
4
-
-
0020190170
-
On the security of ping-pong protocols
-
Dolev D., Even S., Karp R.. On the security of ping-pong protocols. Information and Control, 1982, 55(1): 57-68
-
(1982)
Information and Control
, vol.55
, Issue.1
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.3
-
6
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
Millen J. K., Clark S. C., Freedman S. B.. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 1987, SE-13(2): 274-288
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
7
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
Kemmerer R. A.. Analyzing encryption protocols using formal verification techniques. IEEE Journal of Selected Areas in Communications, 1989, 7(4): 448-457
-
(1989)
IEEE Journal of Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.A.1
-
9
-
-
0025386404
-
A logic of authentication
-
Burrows M., Abadi M., Needham R.. A logic of authentication. ACM Transactions in Computer Systems, 1990, 8(1): 18-36
-
(1990)
ACM Transactions in Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public key protocol using FDR
-
Passau, Germany: Springer-Verlag
-
Lowe G.. Breaking and fixing the Needham-Schroeder public key protocol using FDR. In: Proceedings of TACAS. Lecture Notes in Computer Science 1055. Passau, Germany: Springer-Verlag, 1996, 147-166
-
(1996)
Proceedings of TACAS. Lecture Notes in Computer Science 1055
, pp. 147-166
-
-
Lowe, G.1
-
12
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi M.. Secrecy by typing in security protocols. Journal of the ACM, 1999, 46(5): 749-786
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
14
-
-
0003092378
-
A calculus for cryptographic protocols: The Spi calculus
-
Abadi M., Gordon A. D.. A calculus for cryptographic protocols: The Spi calculus. Information and Computation, 1999, 148(1): 1-70
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
15
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L. C.. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998, 6(1): 85-128
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.C.1
-
16
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
Song Dawn Xiaodong, Berezin Sergey, Perrig Adrian. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 2001, 9(1/2): 47-74
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Sergey, B.2
Adrian, P.3
-
17
-
-
84945119254
-
Entity authentication and key distribution
-
California, USA
-
Bellare M., Rogaway P.. Entity authentication and key distribution. In: Proceedings of CRYPTO'93, California, USA, 1994, 232-249
-
(1994)
Proceedings of CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
11344280768
-
Another look at provable security
-
University of Waterloo, Waterloo, Canada: Technical Report CORR 2004-20
-
Koblitz N., Menezes A.. Another look at provable security. University of Waterloo, Waterloo, Canada: Technical Report CORR 2004-20, 2004
-
(2004)
-
-
Koblitz, N.1
Menezes, A.2
-
19
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM, Dallas, TX
-
Bellare M., Canetti R., Krawczyk H.. A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM, Dallas, TX, 1998, 419-428
-
(1998)
Proceedings of the 30th Annual Symposium on the Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
20
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann (ed.), Springer-Verlag
-
Canetti R., Krawczyk H.. Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann ed. Proceedings of Eurocrypt'01. Lecture Notes in Computer Science 2045. Springer-Verlag, 2001, 453-474
-
(2001)
Proceedings of Eurocrypt'01. Lecture Notes in Computer Science 2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
22
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
Micciancio D., Warinschi B.. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 2004, 12(1): 99-129
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
23
-
-
24144446250
-
Weak key authenticity and the computational completeness of formal encryption
-
Boneh D. (ed.), Springer-Verlag
-
Gligor V., Horvitz D. O.. Weak key authenticity and the computational completeness of formal encryption. In: Boneh D. ed.. Proceedings of CRYPTO 2003. Lecture Notes in Computer Science 2729. Springer-Verlag, 2003, 530-547
-
(2003)
Proceedings of CRYPTO 2003. Lecture Notes in Computer Science 2729
, pp. 530-547
-
-
Gligor, V.1
Horvitz, D.O.2
-
24
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Cambridge, Massachusetts
-
Micciancio D., Warinschi B., Soundness of formal encryption in the presence of active adversaries. In: Proceedings of the Theory of Cryptography Conference (TCC), Cambridge, Massachusetts, 2004, 133-151
-
(2004)
Proceedings of the Theory of Cryptography Conference (TCC)
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
25
-
-
0345412676
-
Logics for reasoning about cryptographic constructions
-
San Diego, California
-
Impagliazzo R., Kapron B.. Logics for reasoning about cryptographic constructions. In: Proceedings of STOC'03, San Diego, California, 2003, 372-383
-
(2003)
Proceedings of STOC'03
, pp. 372-383
-
-
Impagliazzo, R.1
Kapron, B.2
-
26
-
-
1442292329
-
A universally composable cryptographic library
-
Washington, DC
-
Backes M., Pfitzmann B., Waidner M.. A universally composable cryptographic library. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, 2003, 220-230
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
28
-
-
1442267753
-
A probabilistic polynomial-time calculus for analysis of cryptographic protocols (Preliminary report)
-
Arhus, Denmark
-
Mitchell J., Ramanathan A., Scedrov A., Teague V.. A probabilistic polynomial-time calculus for analysis of cryptographic protocols (Preliminary report). In: Proceedings of the 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, 2001, 45
-
(2001)
Proceedings of the 17th Annual Conference on the Mathematical Foundations of Programming Semantics
, pp. 45
-
-
Mitchell, J.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
29
-
-
14844290049
-
Is it possible to decide whether a cryptographic protocol is secure or not
-
Goubault-Larrecq J. (ed.), Special Issue on Cryptographic Protocol Verification
-
Comon H., Shmatikov V.. Is it possible to decide whether a cryptographic protocol is secure or not?. Journal of Telecommunications and Information Technology, Special Issue on Cryptographic Protocol Verification (Goubault-Larrecq J. ed.), 2002, 4(1): 5-15
-
(2002)
Journal of Telecommunications and Information Technology
, vol.4
, Issue.1
, pp. 5-15
-
-
Comon, H.1
Shmatikov, V.2
-
34
-
-
0032671775
-
A metanotation for protocol analysis
-
Mordano, Italy
-
Cervesato I., Durgin N., Lincoln P., Mitchell J., Scedrov A.. A metanotation for protocol analysis. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, 1999, 55-69
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
35
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
Cambridge, England
-
Cervesato I., Durgin N., Lincoln P. D., Mitchell J. C., Scedrov A.. Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000, 35-51
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
36
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
Fabrega F. J. T., Hertzog J., Guttman J.. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999, 7(2/3): 191-230
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Fabrega, F.J.T.1
Hertzog, J.2
Guttman, J.3
-
38
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
San Francisco, California, USA
-
Lincoln P. D., Mitchell J. C., Mitchell M., Scedrov A.. A probabilistic poly-time framework for protocol analysis. In: Proceedings of Computer and Communications Security-CCS'98, San Francisco, California, USA, 1998, 112-121
-
(1998)
Proceedings of Computer and Communications Security - CCS'98
, pp. 112-121
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
39
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
Wing J., Woodcock J. and Davies J. (ed.), Springer-Verlag
-
Lincoln P., Mitchell J., Mitchell M., Scedrov A.. Probabilistic polynomial-time equivalence and security analysis. In: Wing J., Woodcock J., Davies J. eds.. Proceedings of FM'99-Formal Methods. Lecture Notes in Computer Science 1709. Springer-Verlag, 1999, 776-793
-
(1999)
Proceedings of FM'99 - Formal Methods. Lecture Notes in Computer Science 1709
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
41
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Oakland, California
-
Pfitzmann B., Waidner M.. A model for asynchronous reactive systems and its application to secure message transmission. In: Proceedings of the 22nd IEEE Symposium on Security and Privacy, Oakland, California, 2001, 184-200
-
(2001)
Proceedings of the 22nd IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
42
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti R.. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 2000, 3(1): 143-202
-
(2000)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
43
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C.. The NRL protocol analyzer: An overview. Journal of Logic Programming, 1996, 26(2): 113-131
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
45
-
-
0003630836
-
A calculus of communication systems
-
New York: Springer-Verlag
-
Milner R.. A calculus of communication systems. Lecture Notes in Computer Science 92. New York: Springer-Verlag, 1980
-
(1980)
Lecture Notes in Computer Science 92
-
-
Milner, R.1
-
46
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
LosAlamitos, California
-
Gong L., Needham R., Yahalom R.. Reasoning about belief in cryptographic protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, LosAlamitos, California, 1990, 234-248
-
(1990)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
47
-
-
85031620050
-
A Semantics for a logic of authentication
-
Montreal, Quebec, Canada
-
Abadi M., Tuttle M. R.. A Semantics for a logic of authentication. In: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, 1991, 201-216
-
(1991)
Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.R.2
-
49
-
-
33745689203
-
Accountability in electronic commerce protocols
-
Kailar R.. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996, 22(5): 313-328
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
51
-
-
33644952048
-
On the security effectiveness of cryptographic protocols
-
San Diego, California
-
Kailar R., Gligor V. D., Gong L.. On the security effectiveness of cryptographic protocols. In; Proceedings of the 4th International Working Conference on Dependable Computing for Critical Applications, San Diego, California, 1994, 139-157
-
(1994)
Proceedings of the 4th International Working Conference on Dependable Computing for Critical Applications
, pp. 139-157
-
-
Kailar, R.1
Gligor, V.D.2
Gong, L.3
-
54
-
-
0024928980
-
A logic of knowledge and belief for reasoning about computer security
-
Washington, DC
-
Moser L.. A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, Washington, DC, 1989, 57-63
-
(1989)
Proceedings of the Computer Security Foundations Workshop II
, pp. 57-63
-
-
Moser, L.1
-
58
-
-
3242722922
-
A new semantic model for authentication protocols in ASMs
-
Xue R., Feng D.. A new semantic model for authentication protocols in ASMs. Journal of Computer Science and Technology, 2004, 19(4): 555-563
-
(2004)
Journal of Computer Science and Technology
, vol.19
, Issue.4
, pp. 555-563
-
-
Xue, R.1
Feng, D.2
-
59
-
-
0004256761
-
Cryptographic protocols
-
Georgia Institute of Technology, Atlanta, USA
-
Merritt M. J.. Cryptographic protocols [Ph. D. dissertation]. Georgia Institute of Technology, Atlanta, USA, 1983
-
(1983)
-
-
Merritt, M.J.1
-
60
-
-
33644933823
-
Verification of cryptographic protocols
-
Universite deLiege, Belgium
-
Toussaint M.. Verification of cryptographic protocols [Ph. D. dissertation]. Universite deLiege, Belgium, 1991
-
(1991)
-
-
Toussaint, M.1
-
62
-
-
44049113210
-
A calculus of mobile processes, Part I and II
-
100(1): 41-77
-
Milner R., Parrow J., Walker D.. A calculus of mobile processes, Part I and II. Information and Computation, 1992, 100(1): 1-40, 100(1): 41-77
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
66
-
-
84944075155
-
Guarded transitions in evolving specifications
-
Kirchner H. and Ringeissen K. (ed.), London, UK: Springer-Verlag
-
Pavlovic D., Smith D. R.. Guarded transitions in evolving specifications. In: Helene Kirchner, Christophe Ringeissen eds.. Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology Source. Lecture Notes In Computer Science 2422. London, UK: Springer-Verlag, 2002, 411-425
-
(2002)
Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology Source. Lecture Notes In Computer Science 2422
, pp. 411-425
-
-
Pavlovic, D.1
Smith, D.R.2
-
67
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi M., Rogaway P.. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 2002, 5(2): 103-127
-
(2002)
Journal of Cryptology
, vol.5
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
70
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Montreal, Quebec, Canada
-
Canetti R., Lindell Y., Ostrovsky R., Sahai A.. Universally composable two-party and multi-party secure computation. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, Montreal, Quebec, Canada, 2002, 494-503
-
(2002)
Proceedings of the 34th Annual ACM Symposium on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
71
-
-
0034822650
-
A security analysis of the cliques protocols suites
-
Cape Breton, Nova Scotia, Canada
-
Pereira O., Quisquater J.. A security analysis of the cliques protocols suites. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 2001, 73-81
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 73-81
-
-
Pereira, O.1
Quisquater, J.2
-
72
-
-
4944224338
-
Generic insecurity of cliques-type authenticated group key agreement protocols
-
Pacific Grove, CA, USA
-
Pereira O., Quisquater J.. Generic insecurity of cliques-type authenticated group key agreement protocols. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop, Pacific Grove, CA, USA, 2004, 16-29
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop
, pp. 16-29
-
-
Pereira, O.1
Quisquater, J.2
|