-
2
-
-
0000523051
-
A logic of authentication
-
[BAN89]
-
[BAN89] M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London, (Series A, 426, 1871), 1989.
-
(1871)
Proceedings of the Royal Society of London (Series A)
, vol.426
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0000754015
-
On the refinement and simulation of data types and processes
-
[BDW99] K. Araki, A. Galloway, and K. Taguchi, editors. Springer
-
[BDW99] C. Bolton, J. Davies, and J.C.P. Woodcock. On the refinement and simulation of data types and processes. In K. Araki, A. Galloway, and K. Taguchi, editors, Proceedings of the International conference of Integrated Formal Methods (IFM), pages 273-292. Springer, 1999.
-
(1999)
Proceedings of the International Conference of Integrated Formal Methods (IFM)
, pp. 273-292
-
-
Bolton, C.1
Davies, J.2
Woodcock, J.C.P.3
-
4
-
-
84941161567
-
-
[Bee] [last seen 2006-03-16]
-
[Bee] Tickets on your Mobile. URL: http://www.beep.nl [last seen 2006-03-16].
-
Tickets on Your Mobile
-
-
-
5
-
-
0034777649
-
Intercepting mobile mommunications: The insecurity of 802.11
-
[BGW01] New York, NY, USA. ACM Press
-
[BGW01] Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting Mobile Mommunications: The Insecurity of 802.11. In MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, pages 180-189, New York, NY, USA, 2001. ACM Press.
-
(2001)
MobiCom '01: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
[BMV03] LNCS 2808. Springer-Verlag, Heidelberg
-
[BMV03] David Basin, Sebastian Mödersheim, and Luca Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In Proceedings of Esorics'03, LNCS 2808, pages 253-270. Springer-Verlag, Heidelberg, 2003.
-
(2003)
Proceedings of Esorics'03
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
7
-
-
0842305097
-
The ASM refinement method
-
[Bör03] November
-
[Bör03] E. Börger. The ASM Refinement Method. Formal Aspects of Computing, 15 (1-2): 237-257, November 2003.
-
(2003)
Formal Aspects of Computing
, vol.15
, Issue.1-2
, pp. 237-257
-
-
Börger, E.1
-
8
-
-
55049132505
-
Formal system development with KIV
-
[BRS+00] T. Maibaum, editor number 1783 in LNCS. Springer-Verlag
-
[BRS+00] M. Balser, W. Reif, G. Schellhorn, K. Stenzel, and A. Thums. Formal system development with KIV. In T. Maibaum, editor, Fundamental Approaches to Software Engineering, number 1783 in LNCS. Springer-Verlag, 2000.
-
(2000)
Fundamental Approaches to Software Engineering
-
-
Balser, M.1
Reif, W.2
Schellhorn, G.3
Stenzel, K.4
Thums, A.5
-
11
-
-
0003940516
-
-
[dRE98] Data Refinement: Model-Oriented Proof Methods and their Comparison. Cambridge University Press
-
[dRE98] W. de Roever and K. Engelhardt. Data Refinement: Model-Oriented Proof Methods and their Comparison, volume 47 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, 1998.
-
(1998)
Cambridge Tracts in Theoretical Computer Science
, vol.47
-
-
De Roever, W.1
Engelhardt, K.2
-
14
-
-
0002017107
-
Evolving algebras 1993: Lipari guide
-
[Gur95] E. Börger, editor. Oxford University Press
-
[Gur95] M. Gurevich. Evolving algebras 1993: Lipari guide. In E. Börger, editor, Specification and Validation Methods, pages 9-36. Oxford University Press, 1995.
-
(1995)
Specification and Validation Methods
, pp. 9-36
-
-
Gurevich, M.1
-
15
-
-
33746611324
-
Verifying security protocols: An ASM approach
-
[HGRS05] D. Beauquier, E. Börger, and A. Slissenko, editors. University Paris 12 ∼ Val de Marne, Créteil, France, March
-
[HGRS05] D. Haneberg, H. Grandy, W. Reif, and G. Schellhorn. Verifying Security Protocols: An ASM Approach. In D. Beauquier, E. Börger, and A. Slissenko, editors, 12th Int. Workshop on Abstract State Machines, ASM 05. University Paris 12 ∼ Val de Marne, Créteil, France, March 2005.
-
(2005)
12th Int. Workshop on Abstract State Machines, ASM 05
-
-
Haneberg, D.1
Grandy, H.2
Reif, W.3
Schellhorn, G.4
-
16
-
-
85034864446
-
Data refinement refined
-
[HHS86] B. Robinet and R. Wilhelm, editors, Proc. ESOP 86. Springer-Verlag
-
[HHS86] He Jifeng, C. A. R. Hoare, and J. W. Sanders. Data refinement refined. In B. Robinet and R. Wilhelm, editors, Proc. ESOP 86, volume 213 of Lecture. Notes in Computer Science, pages 187-196. Springer-Verlag, 1986.
-
(1986)
Lecture. Notes in Computer Science
, vol.213
, pp. 187-196
-
-
Jifeng, H.1
Hoare, C.A.R.2
Sanders, J.W.3
-
18
-
-
84944039689
-
A method for secure smartcard applications
-
[HRS02] H. Kirchner and C. Ringeissen, editors. Springer LNCS 2422
-
[HRS02] D. Haneberg, W. Reif, and K. Stenzel. A Method for Secure Smartcard Applications. In H. Kirchner and C. Ringeissen, editors, Algebraic Methodology and Software. Technology, Proceedings AMAST 2002. Springer LNCS 2422, 2002.
-
(2002)
Algebraic Methodology and Software. Technology, Proceedings AMAST 2002
-
-
Haneberg, D.1
Reif, W.2
Stenzel, K.3
-
19
-
-
84941159932
-
-
[KIV]
-
[KIV] Web presentation of KIV projects. URL: http://www.informatik.uni-augsburg.de/swt/projects/.
-
-
-
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
[Low96]. Springer-Verlag
-
[Low96] G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
[Mea96]
-
[Mea96] Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
22
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
[Pau98]
-
[Pau98] Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
23
-
-
0842296524
-
Verification of ASM refinements using generalized forward simulation
-
[Sch01]
-
[Sch01] G. Schellhorn. Verification of ASM Refinements Using Generalized Forward Simulation. Journal of Universal Computer Science (J.UCS), 7(11):952-979, 2001. URL: http://hyperg.iicm.tu-graz.ac.at/jucs/.
-
(2001)
Journal of Universal Computer Science (J.UCS)
, vol.7
, Issue.11
, pp. 952-979
-
-
Schellhorn, G.1
-
24
-
-
18144362508
-
ASM refinement and generalizations of forward simulation in data refinement: A comparison
-
[Sch05] May
-
[Sch05] G. Schellhorn. ASM Refinement and Generalizations of Forward Simulation in Data Refinement: A Comparison. Journal of Theoretical Computer Science, vol. 336, no. 2-3:403-435, May 2005.
-
(2005)
Journal of Theoretical Computer Science
, vol.336
, Issue.2-3
, pp. 403-435
-
-
Schellhorn, G.1
-
25
-
-
33746637741
-
A formally verified calculus for full Java Card
-
[Ste04] C. Rattray, S. Maharaj, and C. Shankland, editors Stirling Scotland, July. Springer LNCS 3116
-
[Ste04] K. Stenzel. A formally verified calculus for full Java Card. In C. Rattray, S. Maharaj, and C. Shankland, editors, Algebraic Methodology and Software Technology (AMAST) 2004, Proceedings, Stirling Scotland, July 2004. Springer LNCS 3116.
-
(2004)
Algebraic Methodology and Software Technology (AMAST) 2004, Proceedings
-
-
Stenzel, K.1
-
26
-
-
23844503590
-
-
[Ste05]. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik
-
[Ste05] Kurt Stenzel. Verification of Java Card Programs. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik, URL: http://www.opus-bayern.de/uni-augsburg/volltexte/2005/122/, 2005.
-
(2005)
Verification of Java Card Programs
-
-
Stenzel, K.1
-
27
-
-
84941152937
-
-
[Sun] Java Micro Edition
-
[Sun] Sun Microsystems Inc. Java Micro Edition. URL: http://java.sun.com/j2me/index.jsp.
-
-
-
-
29
-
-
84946432389
-
Analysis of the SSL 3.0 protocol
-
November. A revised version is available
-
[WS96] David Wagner and Bruce Schneier. Analysis of the SSL 3.0 protocol. In 2nd USENIX Workshop on Electronic Commerce, November 1996. A revised version is available at http://www.schneier.com/paper-ssl.html.
-
(1996)
2nd USENIX Workshop on Electronic Commerce
-
-
Wagner, D.1
Schneier, B.2
|