-
2
-
-
0037250327
-
Verifying the SET registration protocols
-
January
-
Giampaolo Bella, Fabio Masacci, and Lawrence C. Paulson. Verifying the SET registration protocols. IEEE Journal on Selected Areas in Communications, 21(1):77-87, January 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 77-87
-
-
Bella, G.1
Masacci, F.2
Paulson, L.C.3
-
3
-
-
84944035753
-
Formal verification of cardholder registration in SET
-
F. Cuppens et al., editor, Computer Security - ESORICS 2000, Springer Verlag
-
Giampaolo Bella, Fabio Masacci, Lawrence C. Paulson, and Piero Tramontano. Formal verification of cardholder registration in SET. In F. Cuppens et al., editor, Computer Security - ESORICS 2000, LNCS 1895, pages 159-174. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1895
, pp. 159-174
-
-
Bella, G.1
Masacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
D. R. Stinson, editor, Advances in Cryptology - CRYPTO'93, Springer Verlag
-
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, Advances in Cryptology - CRYPTO'93, LNCS 773, pages 232-249. Springer Verlag, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
June
-
Ray Bird, I. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications, 11(5):679-693, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
6
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, Springer Verlag
-
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of two-party authentication protocols. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, LNCS 576, pages 44-61. Springer Verlag, 1992.
-
(1992)
LNCS
, vol.576
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
7
-
-
0035475290
-
API-level attacks on embedded systems
-
October
-
Mike Bond and Ross Anderson. API-level attacks on embedded systems. IEEE Computer, 34(10):67-75, October 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 67-75
-
-
Bond, M.1
Anderson, R.2
-
8
-
-
0004019982
-
Authentication: A practical study in belief and action
-
M. Y. Vardi, editor
-
Michael Burrows, Martin Abadi, and Roger Needham. Authentication: A practical study in belief and action. In M. Y. Vardi, editor, Theoretical Aspects of Reasoning About Knowledge, pages 325-342, 1988.
-
(1988)
Theoretical Aspects of Reasoning about Knowledge
, pp. 325-342
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng, editor, Advances in Cryptology - Asiacrypt 2002, Springer Verlag
-
Josef Courtois, Nicolas T. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng, editor, Advances in Cryptology - Asiacrypt 2002, LNCS 2501, pages 267-287. Springer Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, J.1
Pieprzyk, N.T.2
-
11
-
-
0003593599
-
-
September RFC 2693
-
Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylonen. SPKI Certificate Theory, September 1999. RFC 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
15
-
-
18744370043
-
-
February Internet Draft, draft-ietf-ipsec-ikev2-rationale-00.txt
-
Dan Harkins, Charlie Kaufman, Tero Kivinen, Stephen Kent, and Radia Perlman. Design Rationale for IKEv2, February 2002. Internet Draft, draft-ietf-ipsec-ikev2-rationale-00.txt.
-
(2002)
Design Rationale for IKEv2
-
-
Harkins, D.1
Kaufman, C.2
Kivinen, T.3
Kent, S.4
Perlman, R.5
-
19
-
-
0024665744
-
Aanalyzing encryption protocols using formal verification techniques
-
May
-
Richard A. Kemmerer. Aanalyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, May 1989.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.A.1
-
20
-
-
84949220397
-
On the decorrelated fast cipher (DFC) and its theory
-
L. Knudsen, editor, Fast Software Encryption - FSE'99, Springer Verlag
-
Lars R. Knudsen and Vincent Rijmen. On the decorrelated fast cipher (DFC) and its theory. In L. Knudsen, editor, Fast Software Encryption - FSE'99, LNCS 1636, pages 81-94. Springer Verlag, 1999.
-
(1999)
LNCS
, vol.1636
, pp. 81-94
-
-
Knudsen, L.R.1
Rijmen, V.2
-
21
-
-
0345241830
-
-
Addison Wesley Professional
-
Brian LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, and Kevin Price. .NET Framework Security. Addison Wesley Professional, 2002.
-
(2002)
.NET Framework Security
-
-
LaMacchia, B.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.5
-
22
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
March
-
D. Longley and S. Rigby. An automatic search for security flaws in key management schemes. Computers & Security, 11(1):75-89, March 1992.
-
(1992)
Computers & Security
, vol.11
, Issue.1
, pp. 75-89
-
-
Longley, D.1
Rigby, S.2
-
23
-
-
84958752287
-
Towards a survivable security architecture for ad-hoc networks
-
B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, Springer Verlag
-
Silja Mäki and Tuomas Aura. Towards a survivable security architecture for ad-hoc networks. In B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, LNCS 2467, pages 63-73. Springer Verlag, 2002.
-
(2002)
LNCS
, vol.2467
, pp. 63-73
-
-
Mäki, S.1
Aura, T.2
-
25
-
-
84944878354
-
-
CRC Press, Boca Raton, FA
-
A. J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FA, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
26
-
-
84947242748
-
Keynote address: The changing environment (transcript of discussion)
-
B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, Springer Verlag
-
Roger Needham. Keynote address: The changing environment (transcript of discussion). In B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, LNCS 1796, pages 1-5. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1796
, pp. 1-5
-
-
Needham, R.1
-
29
-
-
78649840429
-
Provable security for block ciphers by decorrelation
-
STACS'98, Springer Verlag
-
Serge Vaudenay. Provable security for block ciphers by decorrelation. In STACS'98, LNCS 1373, pages 249-275. Springer Verlag, 1998.
-
(1998)
LNCS
, vol.1373
, pp. 249-275
-
-
Vaudenay, S.1
|