-
1
-
-
0002652530
-
Security Protocols and their Properties
-
[Aba00]. NATO ASI, IOS Press
-
[Aba00] M. Abadi. Security Protocols and their Properties. In Foundations of Secure Computation, pages 39-60. NATO ASI, IOS Press, 2000.
-
(2000)
Foundations of Secure Computation
, pp. 39-60
-
-
Abadi, M.1
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
[AG99]
-
[AG99] M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
84942246406
-
Automatic validation of protocol narration
-
+03]
-
+03] C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H. Nielson, Automatic validation of protocol narration. In Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW 16), pages 126-140, 2003.
-
(2003)
Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW 16)
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.5
-
4
-
-
35048863862
-
Symbolic bisimulation in the spi calculus
-
[BBN04]. Proceedings of CONCUR 2004, Springer, Sept.
-
[BBN04] J. Borgström, S. Briais and U. Nestmann. Symbolic Bisimulation in the Spi Calculus. In Proceedings of CONCUR 2004, volume 3170 of LNCS, pages 161-176. Springer, Sept. 2004.
-
(2004)
LNCS
, vol.3170
, pp. 161-176
-
-
Borgström, J.1
Briais, S.2
Nestmann, U.3
-
6
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
[BMV03], LNCS 2808, Springer-Verlag, Heidelberg
-
[BMV03] D. Basin, S. Mödersheim and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In Proceedings of ESORICS'03, LNCS 2808, pages 253-270. Springer-Verlag, Heidelberg, 2003.
-
(2003)
Proceedings of ESORICS'03
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
8
-
-
0003568551
-
A survey of authentication protocol literature
-
[CJ97], University of York
-
[CJ97] J. A. Clark and J. L. Jacob. A survey of authentication protocol literature. Technical Report 1.0, University of York, 1997.
-
(1997)
Technical Report 1.0
-
-
Clark, J.A.1
Jacob, J.L.2
-
9
-
-
24944514681
-
Operational semantics of security protocols
-
[CM05]. Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings)
-
[CM05] C. Cremers and S. Mauw. Operational Semantics of Security Protocols. In Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings), volume 3466 of LNCS, 2005.
-
(2005)
LNCS
, vol.3466
-
-
Cremers, C.1
Mauw, S.2
-
10
-
-
0020720357
-
On the security of public key protocols
-
[DY83], Mar.
-
[DY83] D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198-208, Mar. 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
12
-
-
84956860311
-
Compiling and verifying security protocols
-
[JRV00]. Logic for Programming and Automated Reasoning, Springer-Verlag, November
-
[JRV00] F. Jacquemard, M. Rusinowitch and L. Vigneron. Compiling and Verifying Security Protocols. In Logic for Programming and Automated Reasoning, volume 1955 of LNCS, pages 131-160. Springer-Verlag, November 2000.
-
(2000)
LNCS
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
13
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
[Low98]
-
[Low98] G. Lowe. Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6:53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
16
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
[Pau98]
-
[Pau98] L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
17
-
-
33646178885
-
Translating security protocols from informal notation into spi calculus
-
[STY05]. Written in Japanese, abstract in English. To appear
-
[STY05] E. Sumii, H. Tatsuzawa and A. Yonezawa. Translating Security Protocols from Informal Notation into Spi Calculus. IPSJ Transactions on Programming, 45, 2005. Written in Japanese, abstract in English. To appear.
-
(2005)
IPSJ Transactions on Programming
, vol.45
-
-
Sumii, E.1
Tatsuzawa, H.2
Yonezawa, A.3
|