-
1
-
-
0004226674
-
-
PhD thesis. University of Waterloo. [Asokan, 1998]
-
[Asokan, 1998] Asokan, N. (1998). Fairness in electronic commerce. PhD thesis. University of Waterloo.
-
(1998)
Fairness in electronic commerce
-
-
Asokan, N.1
-
2
-
-
84949486769
-
Mechanical proofs about a non-repudiation protocol
-
In Boulton, R. J. and Jackson, P. B., editors, Springer-Verlag. [Bella and Paulson, 2001]
-
[Bella and Paulson, 2001] Bella, G. and Paulson, L. C. (2001). Mechanical proofs about a non-repudiation protocol. In Boulton, R. J. and Jackson, P. B., editors, Theorem Proving in Higher Order Logics, 14th International Conference, TPHOLs 2001, volume 2152 of LNCS, pages 91-104. Springer-Verlag.
-
(2001)
Theorem Proving in Higher Order Logics, 14th International Conference, TPHOLs 2001, volume 2152 of LNCS
, pp. 91-104
-
-
Bella, G.1
Paulson, L.C.2
-
3
-
-
84958758114
-
μCRL: A toolset for analysing algebraic specifications
-
In, Springer-Verlag. [Blom et al., 2001]
-
[Blom et al., 2001] Blom, S., Fokkink, W., Groote, J. F., van Langevelde, I., Lisser, B., and van de Pol, J. (2001). μCRL: A toolset for analysing algebraic specifications. In Proceedings of the 13th International Conference on Computer Aided Verification, volume 2102 of LNCS, pages 250-254. Springer-Verlag.
-
(2001)
Proceedings of the 13th International Conference on Computer Aided Verification, volume 2102 of LNCS
, pp. 250-254
-
-
Blom, S.1
Fokkink, W.2
Groote, J.F.3
van Langevelde, I.4
Lisser, B.5
van de Pol, J.6
-
4
-
-
84902522264
-
-
Technical Report SEN-R0410, Centrum voor Wiskunde en Informatica, Amsterdam, The Netherlands. [Cederquist and Dashti, 2004]
-
[Cederquist and Dashti, 2004] Cederquist, J. and Dashti, M. (2004). Formal analysis of a fair payment protocol. Technical Report SEN-R0410, Centrum voor Wiskunde en Informatica, Amsterdam, The Netherlands.
-
(2004)
Formal analysis of a fair payment protocol
-
-
Cederquist, J.1
Dashti, M.2
-
5
-
-
20144373491
-
The Dolev-Yao Intruder is the Most Powerful Attacker
-
In Halpern, J., editor, Boston, MA. IEEE Computer Society Press. [Cervesato, 2001]
-
[Cervesato, 2001] Cervesato, I. (2001). The Dolev-Yao Intruder is the Most Powerful Attacker. In Halpern, J., editor, 16th Annual Symposium on Logic in Computer Science-LICS'01, Boston, MA. IEEE Computer Society Press.
-
(2001)
16th Annual Symposium on Logic in Computer Science-LICS'01
-
-
Cervesato, I.1
-
6
-
-
0020720357
-
On the security of public key protocols
-
[Dolev and Yao, 1983]
-
[Dolev and Yao, 1983] Dolev, D. and Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
7
-
-
84957379824
-
CADP: A protocol validation and verification toolbox
-
In Alur, R. and Henzinger, T. A., editors, Springer-Verlag. [Fernandez et al., 1996]
-
[Fernandez et al., 1996] Fernandez, J.-C., Garavel, H., Kerbrat, A., Mateescu, R., Mounier, L., and Sighireanu, M. (1996). CADP: A protocol validation and verification toolbox. In Alur, R. and Henzinger, T. A., editors, Proceedings of the 8th Conference on Computer-Aided Verification, volume 1102 of LNCS, pages 437-440. Springer-Verlag.
-
(1996)
Proceedings of the 8th Conference on Computer-Aided Verification, volume 1102 of LNCS
, pp. 437-440
-
-
Fernandez, J.-C.1
Garavel, H.2
Kerbrat, A.3
Mateescu, R.4
Mounier, L.5
Sighireanu, M.6
-
8
-
-
0001879305
-
The syntax and semantics of μCRL
-
In Ponse, A., Verhoef, C., and van Vlijmen, S. F. M., editors, Workshops in Computing Series, Springer-Verlag. [Groote and Ponse, 1995]
-
[Groote and Ponse, 1995] Groote, J. and Ponse, A. (1995). The syntax and semantics of μCRL. In Ponse, A., Verhoef, C., and van Vlijmen, S. F. M., editors, Algebra of Communicating Processes '94, Workshops in Computing Series, pages 26-62. Springer-Verlag.
-
(1995)
Algebra of Communicating Processes '94
, pp. 26-62
-
-
Groote, J.1
Ponse, A.2
-
9
-
-
84944080333
-
A game-based verification of non-repudiation and fair exchange protocols
-
In Larsen, K. and Nielsen, M., editors, Springer-Verlag. [Kremer and Raskin, 2001]
-
[Kremer and Raskin, 2001] Kremer, S. and Raskin, J. (2001). A game-based verification of non-repudiation and fair exchange protocols. In Larsen, K. and Nielsen, M., editors, Proceedings of the 12th International Conference on Concurrency Theory, volume 2154 of LNCS, pages 551-565. Springer-Verlag.
-
(2001)
Proceedings of the 12th International Conference on Concurrency Theory, volume 2154 of LNCS
, pp. 551-565
-
-
Kremer, S.1
Raskin, J.2
-
11
-
-
0003960505
-
-
Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology. [Pagnia and Gartner, 1999]
-
[Pagnia and Gartner, 1999] Pagnia, H. and Gartner, F. C. (1999). On the impossibility of fair exchange without a trused third party. Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology.
-
(1999)
On the impossibility of fair exchange without a trused third party
-
-
Pagnia, H.1
Gartner, F.C.2
-
12
-
-
0037244617
-
Fair exchange
-
[Pagnia et al., 2003]
-
[Pagnia et al., 2003] Pagnia, H., Vogt, H., and Gartner, F. C. (2003). Fair exchange. The Computer Journal, 46(1):55-7.
-
(2003)
The Computer Journal
, vol.46
, Issue.1
, pp. 55-57
-
-
Pagnia, H.1
Vogt, H.2
Gartner, F.C.3
-
13
-
-
0031633214
-
Formal analysis of a non-repudiation protocol
-
In, IEEE Computer Society Press. [Schneider, 1998]
-
[Schneider, 1998] Schneider, S. (1998). Formal analysis of a non-repudiation protocol. In Proceedings of The 11th Computer Security Foundations Workshop, pages 54-65. IEEE Computer Society Press.
-
(1998)
Proceedings of The 11th Computer Security Foundations Workshop
, pp. 54-65
-
-
Schneider, S.1
-
14
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
[Shmatikov and Mitchell, 2002]
-
[Shmatikov and Mitchell, 2002] Shmatikov, V. and Mitchell, J. C. (2002). Finite-state analysis of two contract signing protocols. Theoretical Computer Sciene, 283(2):419-450.
-
(2002)
Theoretical Computer Sciene
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
15
-
-
84949477184
-
Using smart cards for fair exchange
-
In, Springer-Verlag. [Vogt et al., 2001]
-
[Vogt et al., 2001] Vogt, H., Pagnia, H., and Gartner, F. C. (2001). Using smart cards for fair exchange. In Electronic Commerce-WELCOM 2001, volume 2232 of LNCS, pages 101-113. Springer-Verlag.
-
(2001)
Electronic Commerce-WELCOM 2001, volume 2232 of LNCS
, pp. 101-113
-
-
Vogt, H.1
Pagnia, H.2
Gartner, F.C.3
-
16
-
-
0039311188
-
Towards verification of non-repudiation protocols
-
In, Springer-Verlag. [Zhou and Gollmann, 1998]
-
[Zhou and Gollmann, 1998] Zhou, J. and Gollmann, D. (1998). Towards verification of non-repudiation protocols. In International Refinement Workshop and Formal Methods Pacific '98: Proceedings of IRW/FMP '98, Discrete Mathematics and Theoretical Computer Science Series, pages 370-380. Springer-Verlag.
-
(1998)
International Refinement Workshop and Formal Methods Pacific '98: Proceedings of IRW/FMP '98, Discrete Mathematics and Theoretical Computer Science Series
, pp. 370-380
-
-
Zhou, J.1
Gollmann, D.2
|