-
1
-
-
33745118120
-
-
[Abs04] Abslnt. aicall
-
[Abs04] Abslnt. aicall. http://www.aicall.de/, 2004.
-
(2004)
-
-
-
4
-
-
35048861896
-
A tool for checking ANSI-C programs
-
[CKL04]. In Kurt Jensen and Andreas Podelski, editors, TACAS. Springer
-
[CKL04] Edmund M. Clarke, Daniel Kroening, and Flavio Lerda. A tool for checking ANSI-C programs. In Kurt Jensen and Andreas Podelski, editors, TACAS, volume 2988 of Lecture Notes in Computer Science, pages 168-176. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2988
, pp. 168-176
-
-
Clarke, E.M.1
Kroening, D.2
Lerda, F.3
-
5
-
-
0043197065
-
Behavioral consistency of C and Verilog programs using bounded model checking
-
[CKY03], School of Computer Science, Carnegie Mellon University
-
[CKY03] E. Clarke, D. Kroening, and K. Yorav. Behavioral consistency of C and Verilog programs using bounded model checking. Technical Report CMUCS-03-126, School of Computer Science, Carnegie Mellon University, 2003.
-
(2003)
Technical Report
, vol.CMUCS-03-126
-
-
Clarke, E.1
Kroening, D.2
Yorav, K.3
-
6
-
-
0037271415
-
First-order verification of cryptographic protocols
-
[Coh03]
-
[Coh03] Ernie Cohen. First-order verification of cryptographic protocols. Journal of Computer Security, 11(2):189-216, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 189-216
-
-
Cohen, E.1
-
8
-
-
0020720357
-
On the security of public key protocols
-
[DY83]
-
[DY83] D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
9
-
-
84958046566
-
Secure interoperation of secure distributed databases
-
[GRS99]. In Jeannette M. Wing, Jim Woodcock, and Jim Davies, editors, number 1708 in Lecture Notes in Computer Science, Springer-Verlag
-
[GRS99] Fred Gilham, Robert A. Riemenschneider, and Victoria Stavridou. Secure interoperation of secure distributed databases. In Jeannette M. Wing, Jim Woodcock, and Jim Davies, editors, World Congress on Formal Methods in the Development of Computing Systems (FM 99), number 1708 in Lecture Notes in Computer Science, pages 701-717. Springer-Verlag, 1999.
-
(1999)
World Congress on Formal Methods in the Development of Computing Systems (FM 99)
, pp. 701-717
-
-
Gilham, F.1
Riemenschneider, R.A.2
Stavridou, V.3
-
10
-
-
0035361164
-
Software model checking: Extracting verification models from source code
-
[HS01]
-
[HS01] G.J. Holzmann and M.H. Smith. Software model checking: extracting verification models from source code. Software Testing, Verification & Reliability, 11(2):65-79, 2001.
-
(2001)
Software Testing, Verification & Reliability
, vol.11
, Issue.2
, pp. 65-79
-
-
Holzmann, G.J.1
Smith, M.H.2
-
11
-
-
33646915332
-
Practical security analysis of C programs using automatic theorem provers
-
[JK04], Verisoft Project, December
-
[JK04] J. Jürjens and Thomas Kuhn. Practical security analysis of C programs using automatic theorem provers. Technical Report ITB 51, Verisoft Project, December 2004.
-
(2004)
Technical Report
, vol.ITB 51
-
-
Jürjens, J.1
Kuhn, T.2
-
14
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
[Jür05]. IEEE Computer Society
-
[Jür05] J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In 27th International Conference on Software Engineering (ICSE 2005). IEEE Computer Society, 2005.
-
(2005)
27th International Conference on Software Engineering (ICSE 2005)
-
-
Jürjens, J.1
-
16
-
-
33745129539
-
-
[Lab04] RSA Labs. PKCS 11
-
[Lab04] RSA Labs. PKCS 11 http://www. rsasecurity.com/rsalabs/node.asp?id=2133, 2004.
-
(2004)
-
-
-
17
-
-
0002219322
-
An attack on a recursive authentication protocol
-
[RS98]
-
[RS98] P. Ryan and S. Schneider. An attack on a recursive authentication protocol. Information Processing Letters, 65:7-10, 1998.
-
(1998)
Information Processing Letters
, vol.65
, pp. 7-10
-
-
Ryan, P.1
Schneider, S.2
-
18
-
-
84957071248
-
Automatic verification of cryptographic protocols with SETHEO
-
[Sch97]. In W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14),. Springer-Verlag
-
[Sch97] J. Schumann. Automatic verification of cryptographic protocols with SETHEO. In W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14), volume 1249 of Lecture Notes in Computer Science, pages 87-100. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1249
, pp. 87-100
-
-
Schumann, J.1
-
19
-
-
33745162711
-
Analyzing cryptographic protocols in a reactive framework
-
[Shy02]. In Agostino Cortesi, editor, VMCAI,. Springer
-
[Shy02] R. K. Shyamasundar. Analyzing cryptographic protocols in a reactive framework. In Agostino Cortesi, editor, VMCAI, volume 2294 of Lecture Notes in Computer Science, pages 46-64. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2294
, pp. 46-64
-
-
Shyamasundar, R.K.1
-
21
-
-
84891081669
-
A bound on attacks on authentication protocols
-
[Sto02]. In Ricardo A. Baeza-Yates, Ugo Montanari, and Nicola Santoro, editors, IFIP TCS. Kluwer
-
[Sto02] Scott D. Stoller. A bound on attacks on authentication protocols. In Ricardo A. Baeza-Yates, Ugo Montanari, and Nicola Santoro, editors, IFIP TCS, volume 223 of IFIP Conference Proceedings, pages 588-600. Kluwer, 2002.
-
(2002)
IFIP Conference Proceedings
, vol.223
, pp. 588-600
-
-
Stoller, S.D.1
-
22
-
-
84886043387
-
3 theorem prover
-
[SW00]. In R. Dyckhoff, editor, Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX 2000),. Springer-Verlag
-
3 theorem prover. In R. Dyckhoff, editor, Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX 2000), volume 1847 of Lecture Notes in Computer Science, pages 436-440. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1847
, pp. 436-440
-
-
Stenz, G.1
Wolf, A.2
-
23
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
[Wei99]. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16)
-
[Wei99] C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16), volume 1632 of Lecture Notes in Computer Science, pages 314-328, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|