-
1
-
-
84879078812
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
LNCS 1872, Springer
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP TCS, LNCS 1872, pp. 3-22. Springer, 2000.
-
(2000)
Proc. 1st IFIP TCS
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
LNCS 3576, Springer
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Proc. CAV2005, LNCS 3576, pp. 281-285. Springer, 2005.
-
(2005)
Proc. CAV2005
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heám, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
3
-
-
33745824225
-
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging Scenario
-
Department of Computer Science, ETH Zurich
-
M. Backes, S. Mödersheim, B. Pfitzmann, and L. Viganò. Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (Extended Version). Technical Report 502, Department of Computer Science, ETH Zurich, 2006. Available at www.infsec.ethz.ch.
-
(2006)
Technical Report
, vol.502
-
-
Backes, M.1
Mödersheim, S.2
Pfitzmann, B.3
Viganò, L.4
-
4
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-yao style cryptographic library
-
M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. 17th IEEE CSFW, 2004.
-
(2004)
Proc. 17th IEEE CSFW
-
-
Backes, M.1
Pfitzmann, B.2
-
5
-
-
1442292329
-
A composable cryptographic library with nested operations (extended abstract)
-
Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM CCS, pp. 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
-
(2003)
Proc. 10th ACM CCS
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
6
-
-
0142250274
-
Symmetric authentication within a simulatable cryptographic library
-
LNCS 2808, Springer
-
M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th ESORICS, LNCS 2808, pp. 271-290. Springer, 2003.
-
(2003)
Proc. 8th ESORICS
, pp. 271-290
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
7
-
-
35048854169
-
A general composition theorem for secure reactive systems
-
LNCS 2951, Springer
-
M. Backes, B. Pfitzmann, and M. Waidner. A general composition theorem for secure reactive systems. In Proc. 1st TCC, LNCS 2951, pp. 336-354. Springer, 2004.
-
(2004)
Proc. 1st TCC
, pp. 336-354
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
8
-
-
19744367735
-
OFMC: A Symbolic model-checker for security protocols
-
D. Basin, S. Mödersheim, and L. Viganò. OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security, 4(3): 181-208, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
10
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
LNCS 1976, Springer
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proc. ASIACRYPT 2000, LNCS 1976, pp. 531-545. Springer, 2000.
-
(2000)
Proc. ASIACRYPT 2000
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
11
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions
-
LNCS 1976, Springer
-
M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions. In Proc. ASIA-CRYPT 2000, LNCS 1976, pp. 317-330. Springer, 2000.
-
(2000)
Proc. ASIA-CRYPT 2000
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
2442519269
-
A semantics for web service authentication
-
ACM Press
-
K. Bhargavan, C. Fournet, and A. Gordon. A semantics for web service authentication. In Proc. 31st POPL, pp. 198-209. ACM Press, 2004.
-
(2004)
Proc. 31st POPL
, pp. 198-209
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
-
15
-
-
35048821943
-
TulaFale: A security tool for web servies
-
LNCS 3188, Springer
-
K. Bhargavan, C. Fournet, A. Gordon, and R. Pucella. TulaFale: A security tool for web servies. In Proc. 2nd FMCO, LNCS 3188, pp. 197-222. Springer, 2004.
-
(2004)
Proc. 2nd FMCO
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
Pucella, R.4
-
16
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE CSFW, pp. 82-96, 2001.
-
(2001)
Proc. 14th IEEE CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
17
-
-
24144452823
-
Static validation of security protocols
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. Riis Nielson. Static validation of security protocols. Journal of Computer Security, 13(3):347-390, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
19
-
-
0004175734
-
-
May
-
D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. F. Nielsen, S. Thatte, and D. Winer. Simple object access protocol (SOAP) 1.1, May 2000.
-
(2000)
Simple Object Access Protocol (SOAP) 1.1
-
-
Box, D.1
Ehnebuske, D.2
Kakivaya, G.3
Layman, A.4
Mendelsohn, N.5
Nielsen, H.F.6
Thatte, S.7
Winer, D.8
-
20
-
-
33646073024
-
Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
-
R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive, Report 2004/334, 2004.
-
(2004)
Cryptology EPrint Archive, Report 2004/334
-
-
Canetti, R.1
Herzog, J.2
-
21
-
-
23144433992
-
A high level protocol specification language for industrial security-sensitive protocols
-
Austrian Computer Society
-
Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, J. Mantovani, S. Mödersheim, and L. Vigneron. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In Proc. Workshop on Specification and Automated Processing of Security Requirements (SAPS'04), pp. 193-205. Austrian Computer Society, 2004.
-
(2004)
Proc. Workshop on Specification and Automated Processing of Security Requirements (SAPS'04)
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Drielsma, P.H.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
23
-
-
35248860689
-
Security properties: Two agents are sufficient
-
LNCS 2618, Springer
-
H. Comon-Lundh and V. Cortier. Security properties: two agents are sufficient. In Proc. 12th ESOP, LNCS 2618, pp. 99-113. Springer, 2003.
-
(2003)
Proc. 12th ESOP
, pp. 99-113
-
-
Comon-Lundh, H.1
Cortier, V.2
-
24
-
-
33745856557
-
-
Apr.
-
D. Davis, C. Ferris, V. Gajjala, K. Gavrylyuk, M. Gudgin, C. Kaler, D. Langworthy, M. Moroney, A. Nadalin, J. Roots, T. Storey, T. Vishwanath, and D. Walter. Secure WS-ReliableMessaging scenarios, Apr. 2005. ftp://www6.software.ibm.com/software/developer/library/ws-rmseconscenario.doc.
-
(2005)
Secure WS-ReliableMessaging Scenarios
-
-
Davis, D.1
Ferris, C.2
Gajjala, V.3
Gavrylyuk, K.4
Gudgin, M.5
Kaler, C.6
Langworthy, D.7
Moroney, M.8
Nadalin, A.9
Roots, J.10
Storey, T.11
Vishwanath, T.12
Walter, D.13
-
27
-
-
4243197458
-
-
D. F. Ferguson, T. Storey, B. Lovering, and J. Shewchuk. Secure, reliable, transacted Web Services - architecture and composition, Oct. 2003. Available at http://www-106.ibm.com/developerworks/webservices/librsury/ws-securtrans/.
-
(2003)
Secure, Reliable, Transacted Web Services - Architecture and Composition
-
-
Ferguson, D.F.1
Storey, T.2
Lovering, B.3
Shewchuk, J.4
-
30
-
-
23144459426
-
Towards an independent semantics and verification technology for the HLPSL specification language
-
A. Gotsman, F. Massacci, and M. Pistore. Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electronic Notes in Theoretical Computer Science 135(1):59-77, 2005.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.135
, Issue.1
, pp. 59-77
-
-
Gotsman, A.1
Massacci, F.2
Pistore, M.3
-
34
-
-
33745828277
-
-
Feb.
-
M. Hur, R. D. Johnson, A. Medvinsky, Y. Rouskov, J. Spellman, S. Weeden, and A. Nadalin. Passive Requestor Federation Interop Scenario, Version 0.4, Feb. 2004. ftp://www6.software.ibm.com/software/developer/library/ws-fpscenario2.doc.
-
(2004)
Passive Requestor Federation Interop Scenario, Version 0.4
-
-
Hur, M.1
Johnson, R.D.2
Medvinsky, A.3
Rouskov, Y.4
Spellman, J.5
Weeden, S.6
Nadalin, A.7
-
35
-
-
84956860311
-
Compiling and verifying security protocols
-
LNCS 1955, Springer
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and verifying security protocols. In Proc. LPAR 2000, LNCS 1955, pp. 131-160. Springer, 2000.
-
(2000)
Proc. LPAR 2000
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
38
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pp. 71-85, 2004.
-
(2004)
Proc. 25th IEEE Symposium on Security & Privacy
, pp. 71-85
-
-
Laud, P.1
-
39
-
-
0030708255
-
A hierarchy of authentication specifications
-
G. Lowe. A hierarchy of authentication specifications. In Proc. 10th IEEE CSFW, pp. 31-43, 1997.
-
(1997)
Proc. 10th IEEE CSFW
, pp. 31-43
-
-
Lowe, G.1
-
40
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
LNCS 2951, Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st TCC, LNCS 2951, pp. 133-151. Springer, 2004.
-
(2004)
Proc. 1st TCC
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
41
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9:47-74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
|