-
1
-
-
0003092378
-
A calculus for cryptographic protocols. The spi calculus
-
January
-
Martin Abadi and Andrew D. Gordon. A calculus for cryptographic protocols. The spi calculus. Information and Computation, 148(1):1-70, January 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84874713281
-
A framework for the analysis of security protocols
-
Springer-Verlag
-
Michele Boreale and Maria Grazia Buscemi. A framework for the analysis of security protocols. In Proceedings of CONCUR'01. Springer-Verlag, 2002.
-
(2002)
Proceedings of CONCUR'01
-
-
Boreale, M.1
Buscemi, M.G.2
-
3
-
-
0036308321
-
Proof techniques for cryptographic processes
-
IEEE Computer Society Press
-
Michele Boreale, Rocco De Nicola, and Rosario Pugliese. Proof techniques for cryptographic processes. In Proceedings of 14th IEEE LICS, pages 157-166. IEEE Computer Society Press, 1999.
-
(1999)
Proceedings of 14th IEEE LICS
, pp. 157-166
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
5
-
-
35248859741
-
A new knowledge representation strategy for cryptographic protocol analysis
-
Proceedings of TACAS'03, Springer-Verlag, April
-
Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, and Adriano Valenzano. A new knowledge representation strategy for cryptographic protocol analysis. In Proceedings of TACAS'03, volume 2619 of Lecture Notes in Computer Science, pages 284-298. Springer-Verlag, April 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2619
, pp. 284-298
-
-
Bertolotti, I.C.1
Durante, L.2
Sisto, R.3
Valenzano, A.4
-
6
-
-
0003257683
-
Using state space exploration and a natural deduction style message derivation engine to verify security protocols
-
London, Chapman & Hall
-
E. M. Clarke, S. Jha, and W. Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings of IFIP PROCOMET, pages 87-106, London, 1998. Chapman & Hall.
-
(1998)
Proceedings of IFIP PROCOMET
, pp. 87-106
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
7
-
-
0039334690
-
Verifying security protocols with Brutus
-
October
-
E. M. Clarke, S. Jha, and W. Marrero. Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 9(4):443-487, October 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
8
-
-
84947730957
-
Constraint solving and insecurity decision in presence of exclusive or, June 2003
-
H. Comon-Lundh and V. Shmatikov. Constraint solving and insecurity decision in presence of exclusive or, June 2003. To appear in Proc. of 18th IEEE LICS'2003.
-
Proc. of 18th IEEE LICS'2003
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
11
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
T. Margaria and B. Steffen, editors, Proceedings of TACAS'96, Springer-Verlag
-
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In T. Margaria and B. Steffen, editors, Proceedings of TACAS'96, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
12
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE Computer Society Press, June
-
Gavin Lowe. Casper: a compiler for the analysis of security protocols. In Proceedings of 10th IEEE CSFW, pages 18-30. IEEE Computer Society Press, June 1997.
-
(1997)
Proceedings of 10th IEEE CSFW
, pp. 18-30
-
-
Lowe, G.1
-
13
-
-
0033353968
-
Towards a completeness result for model checking security protocols
-
Gavin Lowe. Towards a completeness result for model checking security protocols. Journal of Computer Security, 7(2-3):89-146, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
15
-
-
18544366384
-
A unification algorithm for the group Diffie-Hellman protocol
-
Catherine Meadows and Paliath Narendran. A unification algorithm for the group Diffie-Hellman protocol. In Proceedings of WITS'02, 2002.
-
(2002)
Proceedings of WITS'02
-
-
Meadows, C.1
Narendran, P.2
-
16
-
-
70349714960
-
Symbolic protocol analysis with products and Diffie-Hellman exponentiation
-
June
-
Jonathan Millen and Vitaly Shmatikov. Symbolic protocol analysis with products and Diffie-Hellman exponentiation, June 2003. To appear in Proc. of 16th IEEE CSFW.
-
(2003)
Proc. of 16th IEEE CSFW
-
-
Millen, J.1
Shmatikov, V.2
-
17
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
February
-
Jonathan K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274-288, February 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
18
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
Sixth International Static Analysis Symposium (SAS'99), Springer Verlag
-
David Monniaux. Abstracting cryptographic protocols with tree automata. In Sixth International Static Analysis Symposium (SAS'99), number 1694 in Lecture Notes in Computer Science, pages 149-163. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, Issue.1694
, pp. 149-163
-
-
Monniaux, D.1
-
19
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
20
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NP-complete
-
IEEE Computer Society Press, June
-
Michaël Rusinowitch and Mathieu Turuani. Protocol insecurity with finite number of sessions is NP-complete. In Proceedings of 14th IEEE CSFW, pages 174-187. IEEE Computer Society Press, June 2001.
-
(2001)
Proceedings of 14th IEEE CSFW
, pp. 174-187
-
-
Rusinowitch, M.1
Turuani, M.2
-
21
-
-
0000937825
-
Verifying authentication protocols in CSP
-
September
-
Steve Schneider. Verifying authentication protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741-758, September 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.9
, pp. 741-758
-
-
Schneider, S.1
|