-
1
-
-
85028112313
-
The AVISPA tool for the automated validation of Internet security protocols and applications
-
Springer
-
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Proc. of Computer-aided Verification (CAV). Springer, 2005. URL: www.avispa-project.org.
-
(2005)
Proc. of Computer-aided Verification (CAV)
-
-
-
2
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. TACS, pages 82-94, 2001.
-
(2001)
Proc. TACS
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
4
-
-
35048863550
-
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
-
Springer LNCS 3193
-
M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. ESORICS, pages 89-108. Springer LNCS 3193, 2004.
-
(2004)
Proc. ESORICS
, pp. 89-108
-
-
Backes, M.1
-
5
-
-
57049152390
-
Cryptographically sound security proofs for basic and public-key Kerberos
-
June
-
M. Backes, I. Cervesato, A. D. Jaggard, A. Scedrov, and J.-K. Tsay. Cryptographically sound security proofs for basic and public-key Kerberos. IACR Cryptology ePrint Archive, Report 2006/219, http://eprint.iacr.org/, June 2006.
-
(2006)
IACR Cryptology EPrint Archive, Report
, vol.2006
, Issue.219
-
-
Backes, M.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
Tsay, J.-K.5
-
6
-
-
35248899328
-
Cryptographically sound and machine-assisted verification of security protocols
-
Springer LNCS 2607
-
M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th STAGS, pages 675-686. Springer LNCS 2607, 2003.
-
(2003)
Proc. 20th STAGS
, pp. 675-686
-
-
Backes, M.1
Jacobi, C.2
-
7
-
-
10844233317
-
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
-
M. Backes and B. Pfitzmann. A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. Journal on Selected Areas in Communications, 22(10):2075-2086, 2004.
-
(2004)
Journal on Selected Areas in Communications
, vol.22
, Issue.10
, pp. 2075-2086
-
-
Backes, M.1
Pfitzmann, B.2
-
8
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
-
June
-
M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. CSFW04, pages 204-218, June 2004.
-
(2004)
Proc. CSFW04
, pp. 204-218
-
-
Backes, M.1
Pfitzmann, B.2
-
9
-
-
24344472288
-
Relating symbolic and cryptographic secrecy
-
April-June
-
M. Backes and B. Pfitzmann. Relating symbolic and cryptographic secrecy. IEEE Trans. Dependable Secure Comp., 2(2): 109-123, April-June 2005.
-
(2005)
IEEE Trans. Dependable Secure Comp.
, vol.2
, Issue.2
, pp. 109-123
-
-
Backes, M.1
Pfitzmann, B.2
-
10
-
-
27544482135
-
Relating symbolic and cryptographic secrecy
-
Extended version in IACR Cryptology ePrint Archive 2004/300
-
M. Backes and B. Pfitzmann. Relating symbolic and cryptographic secrecy. In Proc. 26th IEEE Symposium on Security & Privacy, pages 171-182, 2005. Extended version in IACR Cryptology ePrint Archive 2004/300.
-
(2005)
Proc. 26th IEEE Symposium on Security & Privacy
, pp. 171-182
-
-
Backes, M.1
Pfitzmann, B.2
-
11
-
-
33845526589
-
On the cryptographic key secrecy of the stregthened Yahalom protocol
-
To appear
-
M. Backes and B. Pfitzmann. On the cryptographic key secrecy of the stregthened Yahalom protocol. In Proceedings of 21st IFIP SEC'06, To appear.
-
Proceedings of 21st IFIP SEC'06
-
-
Backes, M.1
Pfitzmann, B.2
-
12
-
-
1442292329
-
A composable cryptographic library with nested operations
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. CCS'03, pages 220-230, 2003.
-
(2003)
Proc. CCS'03
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
13
-
-
0142250274
-
Symmetric authentication within a simulatable cryptographic library
-
Springer LNCS 2808
-
M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. ESORICS'03, pages 271-290. Springer LNCS 2808, 2003.
-
(2003)
Proc. ESORICS'03
, pp. 271-290
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
14
-
-
32844458560
-
A universally composable cryptographic library
-
January
-
M. Backes, B. Pfitzmann, and M. Waidner. A universally composable cryptographic library. IACR Cryptology ePrint Archive, Report 2003/015, http://eprint.iacr.org/, January 2003.
-
(2003)
IACR Cryptology EPrint Archive, Report
, vol.2003
, Issue.15
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
15
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
Springer LNCS 1485
-
G. Bella and L. C. Paulson. Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In Proc. ESORICS'98, pages 361-375. Springer LNCS 1485, 1998.
-
(1998)
Proc. ESORICS'98
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
16
-
-
84945119254
-
Entity authentication and key distribution
-
Springer LNCS 773
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proc. CRYPTO '93, pages 232-249. Springer LNCS 773, 1994.
-
(1994)
Proc. CRYPTO '93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
33646073024
-
Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
-
R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). In Proc. 3rd Theory of Cryptography Conference (TCC), 2006.
-
(2006)
Proc. 3rd Theory of Cryptography Conference (TCC)
-
-
Canetti, R.1
Herzog, J.2
-
20
-
-
33750269903
-
Breaking and fixing public-key Kerberos
-
I. Cervesato, A. D. Jaggard, A. Scedrov, J.-K. Tsay, and C. Walstad. Breaking and fixing public-key Kerberos. In Proc. WITS'06, 2006.
-
(2006)
Proc. WITS'06
-
-
Cervesato, I.1
Jaggard, A.D.2
Scedrov, A.3
Tsay, J.-K.4
Walstad, C.5
-
21
-
-
33750238106
-
Specifying Kerberos 5 cross-realm authentication
-
I. Cervesato, A. D. Jaggard, A. Scedrov, and C. Walstad. Specifying Kerberos 5 Cross-Realm Authentication. In Proc. WITS'05, pages 12-26, 2005.
-
(2005)
Proc. WITS'05
, pp. 12-26
-
-
Cervesato, I.1
Jaggard, A.D.2
Scedrov, A.3
Walstad, C.4
-
22
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In Proc. ESOP-14, pages 157-171, 2005.
-
(2005)
Proc. ESOP-14
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
23
-
-
26444565771
-
Probabilistic polynomial-time semantics for a protocol security logic
-
Springer LNCS 3580
-
A. Datta, A. Derek, J. Mitchell, V. Shmatikov, and M. Turuani. Probabilistic polynomial-time semantics for a protocol security logic. In Proc. ICALP, pages 16-29. Springer LNCS 3580, 2005.
-
(2005)
Proc. ICALP
, pp. 16-29
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Shmatikov, V.4
Turuani, M.5
-
24
-
-
33750236156
-
Key exchange protocols: Security definition, proof method, and applications
-
Venice, Italy. IEEE Press
-
A. Datta, A. Derek, J. Mitchell, and B. Warinschi. Key exchange protocols: Security definition, proof method, and applications. In 19th IEEE Computer Security Foundations Workshop (CSFW 19), Venice, Italy, 2006. IEEE Press.
-
(2006)
19th IEEE Computer Security Foundations Workshop (CSFW 19)
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Warinschi, B.4
-
25
-
-
0020720357
-
On the security of public-key protocols
-
D. Dolev and A. Yao. On the security of public-key protocols. IEEE Trans. Info. Theory, 2(29): 198-208, 1983.
-
(1983)
IEEE Trans. Info. Theory
, vol.2
, Issue.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
26
-
-
0023545076
-
How to play any mental game - Or - A completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proc. STOC, pages 218-229, 1987.
-
(1987)
Proc. STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
28
-
-
0035750923
-
The faithfulness of abstract protocol analysis: Message authentication
-
J. D. Guttman, F. J. Thayer Fabrega, and L. Zuck. The faithfulness of abstract protocol analysis: Message authentication. In Proc. CCS-8, pages 186-195, 2001.
-
(2001)
Proc. CCS-8
, pp. 186-195
-
-
Guttman, J.D.1
Thayer Fabrega, F.J.2
Zuck, L.3
-
29
-
-
85143166035
-
Security analysis and improvements for IEEE 802.111
-
C. He and J. C. Mitchell. Security Analysis and Improvements for IEEE 802.111. In Proc. NDSS'05, 2005.
-
(2005)
Proc. NDSS'05
-
-
He, C.1
Mitchell, J.C.2
-
30
-
-
35248848005
-
Plaintext awareness via key registration
-
Springer LNCS 2729
-
J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Proc. CRYPTO, pages 548-564. Springer LNCS 2729, 2003.
-
(2003)
Proc. CRYPTO
, pp. 548-564
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
32
-
-
0345412676
-
Logics for reasoning about cryptographic constructions
-
R. Impagliazzo and B. M. Kapron. Logics for reasoning about cryptographic constructions. In Proc. FOCS, pages 372-381, 2003.
-
(2003)
Proc. FOCS
, pp. 372-381
-
-
Impagliazzo, R.1
Kapron, B.M.2
-
33
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. Symp. Security and Privacy, pages 71-85, 2004.
-
(2004)
Proc. Symp. Security and Privacy
, pp. 71-85
-
-
Laud, P.1
-
34
-
-
0032630725
-
Analysis of the internet key exchange protocol using the NRL protocol analyzer
-
C. Meadows. Analysis of the internet key exchange protocol using the NRL Protocol Analyzer. In Proc. IEEE Symp. Security and Privacy, pages 216-231, 1999.
-
(1999)
Proc. IEEE Symp. Security and Privacy
, pp. 216-231
-
-
Meadows, C.1
-
35
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Springer LNCS 2951
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. TCC, pages 133-151. Springer LNCS 2951, 2004.
-
(2004)
Proc. TCC
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
36
-
-
84888829486
-
-
Aug.
-
Microsoft. Security Bulletin MS05-042. http://www.microsoft.com/technet/ security/bulletin/MS05-042.mspx, Aug. 2005.
-
(2005)
Security Bulletin
, vol.MS05-042
-
-
-
37
-
-
0345280512
-
A probabilistic polynominaltime process calculus for analysis of cryptographic protocols (preliminary report)
-
J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominaltime process calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 47:1-31, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.47
, pp. 1-31
-
-
Mitchell, J.1
Mitchell, M.2
Scedrov, A.3
Teague, V.4
-
38
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept.
-
C. Neuman and T. Ts'o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications, 32(9):33-38, Sept. 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, C.1
Ts'o, T.2
-
40
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. S&P, pages 184-200, 2001.
-
(2001)
Proc. S&P
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
|